CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
26.8%
Insufficient access control in silicon reference firmware for Intel® Xeon® Scalable Processor, Intel® Xeon® Processor D Family may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.
Vendor | Product | Version | CPE |
---|---|---|---|
intel | xeon_d-1649n_firmware | - | cpe:2.3:o:intel:xeon_d-1649n_firmware:-:*:*:*:*:*:*:* |
intel | xeon_d-1649n | - | cpe:2.3:h:intel:xeon_d-1649n:-:*:*:*:*:*:*:* |
intel | xeon_d-1633n_firmware | - | cpe:2.3:o:intel:xeon_d-1633n_firmware:-:*:*:*:*:*:*:* |
intel | xeon_d-1633n | - | cpe:2.3:h:intel:xeon_d-1633n:-:*:*:*:*:*:*:* |
intel | xeon_d-1637_firmware | - | cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:* |
intel | xeon_d-1637 | - | cpe:2.3:h:intel:xeon_d-1637:-:*:*:*:*:*:*:* |
intel | xeon_d-1627_firmware | - | cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:* |
intel | xeon_d-1627 | - | cpe:2.3:h:intel:xeon_d-1627:-:*:*:*:*:*:*:* |
intel | xeon_d-1623n | - | cpe:2.3:h:intel:xeon_d-1623n:-:*:*:*:*:*:*:* |
intel | xeon_d-1623n_firmware | - | cpe:2.3:o:intel:xeon_d-1623n_firmware:-:*:*:*:*:*:*:* |
CVSS2
Attack Vector
LOCAL
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
CVSS3
Attack Vector
LOCAL
Attack Complexity
LOW
Privileges Required
HIGH
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
AI Score
Confidence
High
EPSS
Percentile
26.8%