Lucene search

K
cveIntelCVE-2019-11109
HistoryDec 18, 2019 - 10:15 p.m.

CVE-2019-11109

2019-12-1822:15:13
intel
web.nvd.nist.gov
64
cve-2019-11109
intel sps
security
denial of service
local access

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

AI Score

4.5

Confidence

High

EPSS

0

Percentile

5.1%

Logic issue in the subsystem for Intel® SPS before versions SPS_E5_04.01.04.275.0, SPS_SoC-X_04.00.04.100.0 and SPS_SoC-A_04.00.04.191.0 may allow a privileged user to potentially enable denial of service via local access.

Affected configurations

Nvd
Node
intelserver_platform_services_firmwareRangesps_e5_04.00.00.000.0sps_e5_04.01.04.275.0
OR
intelserver_platform_services_firmwareRangesps_soc-a_04.00.00.000.0sps_soc-a_04.00.04.191.0
OR
intelserver_platform_services_firmwareRangesps_soc-x_04.00.00.000.0sps_soc-x_04.00.04.100.0
Node
f5big-ip_b2250_firmwareMatch-
AND
f5big-ip_b2250Match-
Node
f5big-ip_b4300_firmwareMatch-
AND
f5big-ip_b4300Match-
Node
f5big-ip_b4340n_firmwareMatch-
AND
f5big-ip_b4340nMatch-
Node
f5big-ip_b4450n_firmwareMatch-
AND
f5big-ip_b4450nMatch-
Node
f5big-ip_10000s_firmwareMatch-
AND
f5big-ip_10000sMatch-
Node
f5big-ip_10050s_firmwareMatch-
AND
f5big-ip_10050sMatch-
Node
f5big-ip_10150v-n_firmwareMatch-
AND
f5big-ip_10150v-nMatch-
Node
f5big-ip_10200v-s_firmwareMatch-
AND
f5big-ip_10200v-sMatch-
Node
f5big-ip_10250v_firmwareMatch-
AND
f5big-ip_10250vMatch-
Node
f5big-ip_10350v-n_firmwareMatch-
AND
f5big-ip_10350v-nMatch-
Node
f5big-ip_12250v_firmwareMatch-
AND
f5big-ip_12250vMatch-
Node
f5viprion_2200_firmwareMatch-
AND
f5viprion_2200Match-
Node
f5big-ip_i5600_firmwareMatch-
AND
f5big-ip_i5600Match-
Node
f5big-ip_i5800_firmwareMatch-
AND
f5big-ip_i5800Match-
Node
f5big-ip_i7600_firmwareMatch-
AND
f5big-ip_i7600Match-
Node
f5big-ip_i7800_firmwareMatch-
AND
f5big-ip_i7800Match-
Node
f5big-ip_i10600_firmwareMatch-
AND
f5big-ip_i10600Match-
Node
f5big-ip_i10800_firmwareMatch-
AND
f5big-ip_i10800Match-
Node
f5big-ip_i11600_firmwareMatch-
AND
f5big-ip_i11600Match-
Node
f5big-ip_i11800_firmwareMatch-
AND
f5big-ip_i11800Match-
Node
f5big-ip_i15600_firmwareMatch-
AND
f5big-ip_i15600Match-
Node
f5big-ip_i15800_firmwareMatch-
AND
f5big-ip_i15800Match-
Node
f5big-ip_access_policy_managerRange11.5.211.6.5
OR
f5big-ip_access_policy_managerRange12.1.012.1.5
OR
f5big-ip_access_policy_managerRange13.1.013.1.3
OR
f5big-ip_access_policy_managerRange14.1.014.1.2
OR
f5big-ip_access_policy_managerRange15.0.015.0.1
OR
f5big-ip_advanced_firewall_managerRange11.5.211.6.5
OR
f5big-ip_advanced_firewall_managerRange12.1.012.1.5
OR
f5big-ip_advanced_firewall_managerRange13.1.013.1.3
OR
f5big-ip_advanced_firewall_managerRange14.1.014.1.2
OR
f5big-ip_advanced_firewall_managerRange15.0.015.0.1
OR
f5big-ip_analyticsRange11.5.211.6.5
OR
f5big-ip_analyticsRange12.1.012.1.5
OR
f5big-ip_analyticsRange13.1.013.1.3
OR
f5big-ip_analyticsRange14.1.014.1.2
OR
f5big-ip_analyticsRange15.0.015.0.1
OR
f5big-ip_application_acceleration_managerRange11.5.211.6.5
OR
f5big-ip_application_acceleration_managerRange12.1.012.1.5
OR
f5big-ip_application_acceleration_managerRange13.1.013.1.3
OR
f5big-ip_application_acceleration_managerRange14.1.014.1.2
OR
f5big-ip_application_acceleration_managerRange15.0.015.0.1
OR
f5big-ip_application_security_managerRange11.5.211.6.5
OR
f5big-ip_application_security_managerRange12.1.012.1.5
OR
f5big-ip_application_security_managerRange13.1.013.1.3
OR
f5big-ip_application_security_managerRange14.1.014.1.2
OR
f5big-ip_application_security_managerRange15.0.015.0.1
OR
f5big-ip_domain_name_systemRange11.5.211.6.5
OR
f5big-ip_domain_name_systemRange12.1.012.1.5
OR
f5big-ip_domain_name_systemRange13.1.013.1.3
OR
f5big-ip_domain_name_systemRange14.1.014.1.2
OR
f5big-ip_domain_name_systemRange15.0.015.0.1
OR
f5big-ip_fraud_protection_serviceRange11.5.211.6.5
OR
f5big-ip_fraud_protection_serviceRange12.1.012.1.5
OR
f5big-ip_fraud_protection_serviceRange13.1.013.1.3
OR
f5big-ip_fraud_protection_serviceRange14.1.014.1.2
OR
f5big-ip_global_traffic_managerRange11.5.211.6.5
OR
f5big-ip_global_traffic_managerRange12.1.012.1.5
OR
f5big-ip_global_traffic_managerRange13.1.013.1.3
OR
f5big-ip_global_traffic_managerRange14.1.014.1.2
OR
f5big-ip_global_traffic_managerRange15.0.015.0.1
OR
f5big-ip_link_controllerRange11.5.211.6.5
OR
f5big-ip_link_controllerRange12.1.012.1.5
OR
f5big-ip_link_controllerRange13.1.013.1.3
OR
f5big-ip_link_controllerRange14.1.014.1.2
OR
f5big-ip_link_controllerRange15.0.015.0.1
OR
f5big-ip_local_traffic_managerRange11.5.211.6.5
OR
f5big-ip_local_traffic_managerRange12.1.012.1.5
OR
f5big-ip_local_traffic_managerRange13.1.013.1.3
OR
f5big-ip_local_traffic_managerRange14.1.014.1.2
OR
f5big-ip_local_traffic_managerRange15.0.015.0.1
OR
f5big-ip_policy_enforcement_managerRange11.5.211.6.5
OR
f5big-ip_policy_enforcement_managerRange12.1.012.1.5
OR
f5big-ip_policy_enforcement_managerRange13.1.013.1.3
OR
f5big-ip_policy_enforcement_managerRange14.1.014.1.2
OR
f5big-ip_policy_enforcement_managerRange15.0.015.0.1
VendorProductVersionCPE
intelserver_platform_services_firmware*cpe:2.3:o:intel:server_platform_services_firmware:*:*:*:*:*:*:*:*
f5big-ip_b2250_firmware-cpe:2.3:o:f5:big-ip_b2250_firmware:-:*:*:*:*:*:*:*
f5big-ip_b2250-cpe:2.3:h:f5:big-ip_b2250:-:*:*:*:*:*:*:*
f5big-ip_b4300_firmware-cpe:2.3:o:f5:big-ip_b4300_firmware:-:*:*:*:*:*:*:*
f5big-ip_b4300-cpe:2.3:h:f5:big-ip_b4300:-:*:*:*:*:*:*:*
f5big-ip_b4340n_firmware-cpe:2.3:o:f5:big-ip_b4340n_firmware:-:*:*:*:*:*:*:*
f5big-ip_b4340n-cpe:2.3:h:f5:big-ip_b4340n:-:*:*:*:*:*:*:*
f5big-ip_b4450n_firmware-cpe:2.3:o:f5:big-ip_b4450n_firmware:-:*:*:*:*:*:*:*
f5big-ip_b4450n-cpe:2.3:h:f5:big-ip_b4450n:-:*:*:*:*:*:*:*
f5big-ip_10000s_firmware-cpe:2.3:o:f5:big-ip_10000s_firmware:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 561

CNA Affected

[
  {
    "product": "Intel(R) SPS",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "See provided reference"
      }
    ]
  }
]

CVSS2

4.6

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

AI Score

4.5

Confidence

High

EPSS

0

Percentile

5.1%