CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS4
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
PASSIVE
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H
SSVC
Exploitation
none
Automatable
no
Technical Impact
total
Improper input validation in UEFI firmware for some Intel® Processors may allow a privileged user to potentially enable escalation of privilege via local access.
[
{
"cpes": [
"cpe:2.3:o:intel:xeon_e3-1268l_v5_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3900te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:celeron_g3900_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_g4400te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:pentium_g4400_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6100te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i3-6100_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6500te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i5-6500_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700te_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i7-6700_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e7-4809_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e7-4820_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e7-4830_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e7-4850_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e7-8860_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e7-8867_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e7-8870_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e7-8880_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e7-8890_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e7-8891_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e7-8893_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e3-1285_v6_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2124_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2134_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2136_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2224_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2234_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2236_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2314_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2334_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2336_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e-2378_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10900x_x-series_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10920x_x-series_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:core_i9-10940x_x-series_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-1603_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-1607_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-1620_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-1630_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-1650_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-1660_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-1680_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2603_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2609_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2620_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2623_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2630_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2637_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2640_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2643_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2650_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2658_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2660_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2667_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2670_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2679_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2680_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2683_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2689_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2690_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2695_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2697_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2698_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2699_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4610_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4610_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4620_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4627_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4640_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4648_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4650_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4660_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4667_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4669_v3_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1513n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1518_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1520_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1521_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1523n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1527_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1528_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1529_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1531_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1533n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1537_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1539_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1540_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1541_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1548_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1553n_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1557_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1559_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1567_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1571_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_processor_d-1577_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1581_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1587_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1602_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1612_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1622_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1627_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1632_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1637_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1702_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1714_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1726_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1736_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-1739_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2191_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2738_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2779_firmware:-:*:*:*:*:*:*:*",
"cpe:2.3:o:intel:xeon_d-2799_firmware:-:*:*:*:*:*:*:*"
],
"vendor": "intel",
"product": "xeon_d-2799_firmware",
"versions": [
{
"status": "affected",
"version": "0",
"lessThan": "*",
"versionType": "custom"
}
],
"defaultStatus": "unknown"
}
]
CVSS3
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
CVSS4
Attack Vector
LOCAL
Attack Complexity
HIGH
Privileges Required
HIGH
User Interaction
PASSIVE
CVSS:4.0/AV:L/AC:H/AT:P/PR:H/UI:P/VC:H/SC:H/VI:H/SI:H/VA:H/SA:H
SSVC
Exploitation
none
Automatable
no
Technical Impact
total