Search criteria
8 vulnerabilities found for nuc8i3cysm by intel
VAR-202205-0780
Vulnerability from variot - Updated: 2025-05-07 21:17Improper buffer access in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware contain a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202205-0780",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nuc 11 pro kit nuc11tnki50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 enthusiast mini pc nuc11phki7caa",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "phtgl579.0064"
},
{
"model": "nuc 8 compute element cm8i7cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 compute element cm11ebi58w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro kit nuc11tnki3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnki7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi50w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi70q",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 enthusiast kit nuc11phki7c",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "phtgl579.0064"
},
{
"model": "nuc 11 pro kit nuc11tnhi50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnki70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "lapkc71e",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc 11 pro board nuc11tnbi50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc11btmi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "lapbc710",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "bctgl357.0065"
},
{
"model": "nuc11dbbi9",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc11pah",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc 8 compute element cm8ccb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc11paq",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc kit nuc8i7be",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "lapbc510",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "bctgl357.0065"
},
{
"model": "nuc11pa",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc 11 pro board nuc11tnbi5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro compute element nuc9v7qnb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 8 compute element cm8pcb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 pro kit nuc11tnki30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc kit nuc8i3b",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "nuc 11 pro kit nuc11tnhi70l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro board nuc11tnbi3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "lapkc51e",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc 11 pro kit nuc11tnhi3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro board nuc11tnbi30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc11btmi9",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc 9 pro kit nuc9v7qnx",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 11 compute element cm11ebi38w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro board nuc11tnbi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 8 compute element cm8i5cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 pro kit nuc11tnhi30p",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro compute element nuc9vxqnb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc8i3cysn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cycnli35.86a.0050"
},
{
"model": "nuc 11 pro kit nuc11tnhi30l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc9i7qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "nuc9i5qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "lapkc71f",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc11dbbi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc 11 compute element cm11ebi716w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro kit nuc11tnhi30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc9i9qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "nuc8i3cysm",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cycnli35.86a.0050"
},
{
"model": "nuc 11 pro kit nuc11tnki5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi50l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro kit nuc9vxqnx",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 11 pro board nuc11tnbi70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 8 compute element cm8i3cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc kit nuc8i5be",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "nuc 11 compute element cm11ebc4w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "lapbc710",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11btmi9",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro kit nuc11tnhi50z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi30z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi716w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc71e",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebc4w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11dbbi7",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11pah",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11pa",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc71f",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11paq",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi38w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi70z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11btmi7",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc51e",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11dbbi9",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi50z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi58w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapbc510",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"cve": "CVE-2022-21237",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 6.1,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2022-21237",
"impactScore": 8.5,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2022-21237",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 6.7,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2022-21237",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2022-21237",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2022-21237",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2022-21237",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-202205-3047",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2022-21237",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-21237"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3047"
},
{
"db": "NVD",
"id": "CVE-2022-21237"
},
{
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Improper buffer access in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware contain a buffer error vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-21237"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"db": "VULMON",
"id": "CVE-2022-21237"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-21237",
"trust": 3.3
},
{
"db": "JVN",
"id": "JVNVU93344744",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009676",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2022.2320",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3047",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2022-21237",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-21237"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3047"
},
{
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"id": "VAR-202205-0780",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.13392857
},
"last_update_date": "2025-05-07T21:17:37.437000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Intel NUC Buffer error vulnerability fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193791"
},
{
"title": "CVE-2022-XXXX",
"trust": 0.1,
"url": "https://github.com/AlphabugX/CVE-2022-23305 "
},
{
"title": "CVE-2022-XXXX",
"trust": 0.1,
"url": "https://github.com/AlphabugX/CVE-2022-RCE "
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-21237"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3047"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.0
},
{
"problemtype": "Buffer error (CWE-119) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00654.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93344744/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-21237"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.2320"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-21237/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/119.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://github.com/alphabugx/cve-2022-23305"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-21237"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3047"
},
{
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULMON",
"id": "CVE-2022-21237"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3047"
},
{
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2022-21237"
},
{
"date": "2023-08-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"date": "2022-05-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3047"
},
{
"date": "2022-05-12T17:15:10.030000",
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-23T00:00:00",
"db": "VULMON",
"id": "CVE-2022-21237"
},
{
"date": "2023-08-07T08:15:00",
"db": "JVNDB",
"id": "JVNDB-2022-009676"
},
{
"date": "2022-05-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3047"
},
{
"date": "2025-05-05T17:17:46.490000",
"db": "NVD",
"id": "CVE-2022-21237"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3047"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Buffer Error Vulnerability in Multiple Intel Products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009676"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3047"
}
],
"trust": 0.6
}
}
VAR-202205-0782
Vulnerability from variot - Updated: 2025-05-07 20:55Improper input validation in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware contain vulnerabilities related to input validation.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202205-0782",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nuc 11 pro kit nuc11tnki50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 enthusiast mini pc nuc11phki7caa",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "phtgl579.0064"
},
{
"model": "nuc 8 compute element cm8i7cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 compute element cm11ebi58w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro kit nuc11tnki3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnki7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi50w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi70q",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 enthusiast kit nuc11phki7c",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "phtgl579.0064"
},
{
"model": "nuc 11 pro kit nuc11tnhi50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnki70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "lapkc71e",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc 11 pro board nuc11tnbi50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc11btmi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "lapbc710",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "bctgl357.0065"
},
{
"model": "nuc11dbbi9",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc11pah",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc 8 compute element cm8ccb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc11paq",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc kit nuc8i7be",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "lapbc510",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "bctgl357.0065"
},
{
"model": "nuc11pa",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc 11 pro board nuc11tnbi5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro compute element nuc9v7qnb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 8 compute element cm8pcb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 pro kit nuc11tnki30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc kit nuc8i3b",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "nuc 11 pro kit nuc11tnhi70l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro board nuc11tnbi3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "lapkc51e",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc 11 pro kit nuc11tnhi3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro board nuc11tnbi30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc11btmi9",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc 9 pro kit nuc9v7qnx",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 11 compute element cm11ebi38w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro board nuc11tnbi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 8 compute element cm8i5cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 pro kit nuc11tnhi30p",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro compute element nuc9vxqnb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc8i3cysn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cycnli35.86a.0050"
},
{
"model": "nuc 11 pro kit nuc11tnhi30l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc9i7qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "nuc9i5qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "lapkc71f",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc11dbbi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc 11 compute element cm11ebi716w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro kit nuc11tnhi30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc9i9qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "nuc8i3cysm",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cycnli35.86a.0050"
},
{
"model": "nuc 11 pro kit nuc11tnki5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi50l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro kit nuc9vxqnx",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 11 pro board nuc11tnbi70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 8 compute element cm8i3cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc kit nuc8i5be",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "nuc 11 compute element cm11ebc4w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "lapbc710",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11btmi9",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro kit nuc11tnhi50z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi30z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi716w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc71e",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebc4w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11dbbi7",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11pah",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11pa",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc71f",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11paq",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi38w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi70z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11btmi7",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc51e",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11dbbi9",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi50z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi58w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapbc510",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"cve": "CVE-2022-24382",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2022-24382",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2022-24382",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 6.7,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2022-24382",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2022-24382",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2022-24382",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2022-24382",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-202205-3049",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Improper input validation in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware contain vulnerabilities related to input validation.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-24382"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "VULMON",
"id": "CVE-2022-24382"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-24382",
"trust": 3.3
},
{
"db": "JVN",
"id": "JVNVU93344744",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009662",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2022.2320",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3049",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2022-24382",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-24382"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"id": "VAR-202205-0782",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.13392857
},
"last_update_date": "2025-05-07T20:55:52.841000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Intel NUC Enter the fix for the verification error vulnerability",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193793"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.0
},
{
"problemtype": "Inappropriate input confirmation (CWE-20) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00654.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93344744/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-24382"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.2320"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-24382/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-24382"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULMON",
"id": "CVE-2022-24382"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2022-24382"
},
{
"date": "2023-08-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"date": "2022-05-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"date": "2022-05-12T17:15:10.267000",
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2022-24382"
},
{
"date": "2023-08-07T08:15:00",
"db": "JVNDB",
"id": "JVNDB-2022-009662"
},
{
"date": "2022-05-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3049"
},
{
"date": "2025-05-05T17:18:00.110000",
"db": "NVD",
"id": "CVE-2022-24382"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Input validation vulnerability in multiple Intel products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009662"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3049"
}
],
"trust": 0.6
}
}
VAR-202205-0781
Vulnerability from variot - Updated: 2025-05-07 20:16Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202205-0781",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "nuc 11 pro kit nuc11tnki50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 enthusiast mini pc nuc11phki7caa",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "phtgl579.0064"
},
{
"model": "nuc 8 compute element cm8i7cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 compute element cm11ebi58w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro kit nuc11tnki3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnki7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi50w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi70q",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 enthusiast kit nuc11phki7c",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "phtgl579.0064"
},
{
"model": "nuc 11 pro kit nuc11tnhi50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnki70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "lapkc71e",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc 11 pro board nuc11tnbi50z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc11btmi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "lapbc710",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "bctgl357.0065"
},
{
"model": "nuc11dbbi9",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc11pah",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc 8 compute element cm8ccb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc11paq",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc kit nuc8i7be",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "lapbc510",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "bctgl357.0065"
},
{
"model": "nuc11pa",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "patgl357.0042"
},
{
"model": "nuc 11 pro board nuc11tnbi5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro compute element nuc9v7qnb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 8 compute element cm8pcb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 pro kit nuc11tnki30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc kit nuc8i3b",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "nuc 11 pro kit nuc11tnhi70l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro board nuc11tnbi3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "lapkc51e",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc 11 pro kit nuc11tnhi3",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro board nuc11tnbi30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc11btmi9",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc 9 pro kit nuc9v7qnx",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 11 compute element cm11ebi38w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro board nuc11tnbi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 8 compute element cm8i5cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc 11 pro kit nuc11tnhi30p",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro compute element nuc9vxqnb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc8i3cysn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cycnli35.86a.0050"
},
{
"model": "nuc 11 pro kit nuc11tnhi30l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc9i7qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "nuc9i5qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "lapkc71f",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "kctgl357.0040"
},
{
"model": "nuc11dbbi7",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "dbtgl579.0055"
},
{
"model": "nuc 11 compute element cm11ebi716w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "nuc 11 pro kit nuc11tnhi30z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc9i9qn",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qxcfl579.0064"
},
{
"model": "nuc8i3cysm",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cycnli35.86a.0050"
},
{
"model": "nuc 11 pro kit nuc11tnki5",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 11 pro kit nuc11tnhi50l",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 9 pro kit nuc9vxqnx",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "qncflx70.0064"
},
{
"model": "nuc 11 pro board nuc11tnbi70z",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "tntgl357.0059"
},
{
"model": "nuc 8 compute element cm8i3cb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "cbwhl.0095"
},
{
"model": "nuc kit nuc8i5be",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "becfl357.0089"
},
{
"model": "nuc 11 compute element cm11ebc4w",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "ebtgl357.0057"
},
{
"model": "lapbc710",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11btmi9",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro kit nuc11tnhi50z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi30z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi716w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc71e",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebc4w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11dbbi7",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11pah",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11pa",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc71f",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11paq",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi38w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi70z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11btmi7",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapkc51e",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc11dbbi9",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "nuc 11 pro board nuc11tnbi50z",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "intel nuc 11 compute element cm11ebi58w",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
},
{
"model": "lapbc510",
"scope": null,
"trust": 0.8,
"vendor": "\u30a4\u30f3\u30c6\u30eb",
"version": null
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"cve": "CVE-2022-24297",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2022-24297",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2022-24297",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 2.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 6.7,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2022-24297",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2022-24297",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"id": "CVE-2022-24297",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2022-24297",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNNVD",
"id": "CNNVD-202205-3048",
"trust": 0.6,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3048"
},
{
"db": "NVD",
"id": "CVE-2022-24297"
},
{
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. LAPBC510 firmware, LAPBC710 firmware, lapkc71f Multiple Intel products such as firmware have unspecified vulnerabilities.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state",
"sources": [
{
"db": "NVD",
"id": "CVE-2022-24297"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"db": "VULMON",
"id": "CVE-2022-24297"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2022-24297",
"trust": 3.3
},
{
"db": "JVN",
"id": "JVNVU93344744",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009663",
"trust": 0.8
},
{
"db": "AUSCERT",
"id": "ESB-2022.2320",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3048",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2022-24297",
"trust": 0.1
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-24297"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3048"
},
{
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"id": "VAR-202205-0781",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VARIoT devices database",
"id": null
}
],
"trust": 0.13392857
},
"last_update_date": "2025-05-07T20:16:26.852000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Intel NUC Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=193792"
}
],
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3048"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "Lack of information (CWE-noinfo) [NVD evaluation ]",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.5,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00654.html"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93344744/"
},
{
"trust": 0.8,
"url": "https://nvd.nist.gov/vuln/detail/cve-2022-24297"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2022.2320"
},
{
"trust": 0.6,
"url": "https://cxsecurity.com/cveshow/cve-2022-24297/"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "VULMON",
"id": "CVE-2022-24297"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3048"
},
{
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULMON",
"id": "CVE-2022-24297"
},
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"db": "CNNVD",
"id": "CNNVD-202205-3048"
},
{
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2022-24297"
},
{
"date": "2023-08-07T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"date": "2022-05-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3048"
},
{
"date": "2022-05-12T17:15:10.223000",
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2022-05-12T00:00:00",
"db": "VULMON",
"id": "CVE-2022-24297"
},
{
"date": "2023-08-07T08:15:00",
"db": "JVNDB",
"id": "JVNDB-2022-009663"
},
{
"date": "2022-05-24T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202205-3048"
},
{
"date": "2025-05-05T17:17:59.650000",
"db": "NVD",
"id": "CVE-2022-24297"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3048"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Vulnerabilities in multiple Intel products",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2022-009663"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202205-3048"
}
],
"trust": 0.6
}
}
VAR-201912-0882
Vulnerability from variot - Updated: 2024-11-23 21:13Out of bounds write in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) NUC(R) Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel NUC Kit NUC7i5DNKE and other products are products of Intel Corporation of the United States. Intel NUC Kit NUC7i5DNKE is a mini-host product. Intel NUC 8 Mainstream Game Kit is a small desktop computer. Intel NUC 8 Mainstream Game Mini Computer is a small desktop computer.
An out-of-bounds write vulnerability exists in the Intel NUC firmware. Local attackers can use this vulnerability to elevate privileges
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201912-0882",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "cd1p64gk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0053"
},
{
"model": "nuc 8 mainstream game mini computer",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0036"
},
{
"model": "cd1iv128mk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0038"
},
{
"model": "nuc6cays",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0064"
},
{
"model": "nuc7i5dnke",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0067"
},
{
"model": "nuc6i5syh",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0072"
},
{
"model": "nuc8i3cysm",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0043"
},
{
"model": "nuc8i7bek",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0077"
},
{
"model": "nuc7cjyh",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0053"
},
{
"model": "nuc6i7kyk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0066"
},
{
"model": "nuc 8 mainstream game kit",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0036"
},
{
"model": "stk2mv64cc",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0061"
},
{
"model": "nuc8i7hnk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0059"
},
{
"model": "nuc7i7dnke",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0067"
},
{
"model": "d34010wyb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0054"
},
{
"model": "cd1m3128mk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0058"
},
{
"model": "de3815tybe",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0024"
},
{
"model": "nuc7i3dnhe",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0067"
},
{
"model": "stk2m3w64cc",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0062"
},
{
"model": "cd1p64gk",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc 8 mainstream game kit",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc 8 mainstream game mini computer",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i3dnhe",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i5dnke",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i7dnke",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i3cysm",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i7bek",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i7hnk",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "stk2mv64cc",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc7cjyh",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc8i7hnk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute card cd1m3128mk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute card cd1iv128mk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute card cd1p64gk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc6cays",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc6i7kyk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc6i5syh",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute stick stk2mv64cc",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute stick stk2m3w64cc",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc mainstream game kit",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "8"
},
{
"model": "nuc mainstream game mini computer",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "8"
},
{
"model": "nuc kit nuc8i7bek",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc home nuc8i3cysm",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "8-"
},
{
"model": "nuc-kit nuc7i7dnke",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc-kit nuc7i5dnke",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc-kit nuc7i3dnhe",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc board de3815tybe",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc board d34010wyb",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i7bek",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "cd1iv128mk",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc6cays",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "d34010wyb",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i7hnk",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "de3815tybe",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "cd1m3128mk",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "cd1p64gk",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i3cysm",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc 8 mainstream game mini computer",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04682"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013787"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-582"
},
{
"db": "NVD",
"id": "CVE-2019-14612"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:intel:cd1p64gk_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc_8_mainstream_game_kit_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc_8_mainstream_game_mini_computer_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc7i3dnhe_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc7i5dnke_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc7i7dnke_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc8i3cysm_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc8i7bek_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc8i7hnk_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:stk2mv64cc_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013787"
}
]
},
"cve": "CVE-2019-14612",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2019-14612",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2020-04682",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2019-14612",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 6.7,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-14612",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-14612",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2019-14612",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2020-04682",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201912-582",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04682"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013787"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-582"
},
{
"db": "NVD",
"id": "CVE-2019-14612"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Out of bounds write in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) NUC(R) Contains an out-of-bounds vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel NUC Kit NUC7i5DNKE and other products are products of Intel Corporation of the United States. Intel NUC Kit NUC7i5DNKE is a mini-host product. Intel NUC 8 Mainstream Game Kit is a small desktop computer. Intel NUC 8 Mainstream Game Mini Computer is a small desktop computer. \n\r\n\r\nAn out-of-bounds write vulnerability exists in the Intel NUC firmware. Local attackers can use this vulnerability to elevate privileges",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-14612"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013787"
},
{
"db": "CNVD",
"id": "CNVD-2020-04682"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-14612",
"trust": 3.0
},
{
"db": "JVN",
"id": "JVNVU93632155",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013787",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2020-04682",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2019.4655",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201912-582",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04682"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013787"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-582"
},
{
"db": "NVD",
"id": "CVE-2019-14612"
}
]
},
"id": "VAR-201912-0882",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04682"
}
],
"trust": 1.373418242105263
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04682"
}
]
},
"last_update_date": "2024-11-23T21:13:21.988000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "INTEL-SA-00323",
"trust": 0.8,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html"
},
{
"title": "Patch for Intel NUC Cross-Border Write Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/200037"
},
{
"title": "Multiple Intel Product Buffer Error Vulnerability Fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=106359"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04682"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013787"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-582"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-787",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013787"
},
{
"db": "NVD",
"id": "CVE-2019-14612"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-14612"
},
{
"trust": 1.6,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14612"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93632155/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.4655/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04682"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013787"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-582"
},
{
"db": "NVD",
"id": "CVE-2019-14612"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2020-04682"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013787"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-582"
},
{
"db": "NVD",
"id": "CVE-2019-14612"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-04682"
},
{
"date": "2020-01-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-013787"
},
{
"date": "2019-12-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201912-582"
},
{
"date": "2019-12-16T20:15:15.477000",
"db": "NVD",
"id": "CVE-2019-14612"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-04682"
},
{
"date": "2020-01-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-013787"
},
{
"date": "2019-12-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201912-582"
},
{
"date": "2024-11-21T04:27:02.490000",
"db": "NVD",
"id": "CVE-2019-14612"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Intel(R) NUC(R) Vulnerable to out-of-bounds writing",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013787"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "buffer error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201912-582"
}
],
"trust": 0.6
}
}
VAR-201912-0881
Vulnerability from variot - Updated: 2024-11-23 21:06Integer overflow in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) NUC(R) Contains an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel NUC 8 Mainstream Game Kit and so on are a small desktop computer of Intel Corporation of the United States
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201912-0881",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "cd1p64gk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0053"
},
{
"model": "nuc 8 mainstream game mini computer",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0036"
},
{
"model": "cd1iv128mk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0038"
},
{
"model": "nuc6cays",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0064"
},
{
"model": "nuc7i5dnke",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0067"
},
{
"model": "nuc6i5syh",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0072"
},
{
"model": "nuc8i3cysm",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0043"
},
{
"model": "nuc8i7bek",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0077"
},
{
"model": "nuc7cjyh",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0053"
},
{
"model": "nuc6i7kyk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0066"
},
{
"model": "nuc 8 mainstream game kit",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0036"
},
{
"model": "stk2mv64cc",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0061"
},
{
"model": "nuc8i7hnk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0059"
},
{
"model": "nuc7i7dnke",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0067"
},
{
"model": "d34010wyb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0054"
},
{
"model": "cd1m3128mk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0058"
},
{
"model": "de3815tybe",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0024"
},
{
"model": "nuc7i3dnhe",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0067"
},
{
"model": "stk2m3w64cc",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0062"
},
{
"model": "cd1p64gk",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc 8 mainstream game kit",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc 8 mainstream game mini computer",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i3dnhe",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i5dnke",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i7dnke",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i3cysm",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i7bek",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i7hnk",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "stk2mv64cc",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc7cjyh",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc8i7hnk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute card cd1m3128mk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute card cd1iv128mk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute card cd1p64gk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc6cays",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc6i7kyk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc6i5syh",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute stick stk2mv64cc",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute stick stk2m3w64cc",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc mainstream game kit",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "8"
},
{
"model": "nuc mainstream game mini computer",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "8"
},
{
"model": "nuc kit nuc8i7bek",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc home nuc8i3cysm",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "8-"
},
{
"model": "nuc-kit nuc7i7dnke",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc-kit nuc7i5dnke",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc-kit nuc7i3dnhe",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc board de3815tybe",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc board d34010wyb",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "stk2mv64cc",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i3dnhe",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc6i7kyk",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i7dnke",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i7hnk",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc6i5syh",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i3cysm",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "stk2m3w64cc",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i5dnke",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc7cjyh",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04683"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013786"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-580"
},
{
"db": "NVD",
"id": "CVE-2019-14611"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:intel:cd1p64gk_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc_8_mainstream_game_kit_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc_8_mainstream_game_mini_computer_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc7i3dnhe_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc7i5dnke_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc7i7dnke_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc8i3cysm_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc8i7bek_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc8i7hnk_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:stk2mv64cc_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013786"
}
]
},
"cve": "CVE-2019-14611",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2019-14611",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2020-04683",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2019-14611",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 6.7,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-14611",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-14611",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2019-14611",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2020-04683",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201912-580",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "VULMON",
"id": "CVE-2019-14611",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04683"
},
{
"db": "VULMON",
"id": "CVE-2019-14611"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013786"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-580"
},
{
"db": "NVD",
"id": "CVE-2019-14611"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Integer overflow in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) NUC(R) Contains an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel NUC 8 Mainstream Game Kit and so on are a small desktop computer of Intel Corporation of the United States",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-14611"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013786"
},
{
"db": "CNVD",
"id": "CNVD-2020-04683"
},
{
"db": "VULMON",
"id": "CVE-2019-14611"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-14611",
"trust": 3.1
},
{
"db": "JVN",
"id": "JVNVU93632155",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013786",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2020-04683",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2019.4655",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201912-580",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2019-14611",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04683"
},
{
"db": "VULMON",
"id": "CVE-2019-14611"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013786"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-580"
},
{
"db": "NVD",
"id": "CVE-2019-14611"
}
]
},
"id": "VAR-201912-0881",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04683"
}
],
"trust": 1.373418242105263
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04683"
}
]
},
"last_update_date": "2024-11-23T21:06:18.200000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "INTEL-SA-00323",
"trust": 0.8,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html"
},
{
"title": "Patch for Intel NUC Integer Overflow Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/200039"
},
{
"title": "Multiple Intel Product input verification error vulnerability fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=106250"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04683"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013786"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-580"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-190",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013786"
},
{
"db": "NVD",
"id": "CVE-2019-14611"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-14611"
},
{
"trust": 1.7,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14611"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93632155/"
},
{
"trust": 0.6,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00324.html"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.4655/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/190.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04683"
},
{
"db": "VULMON",
"id": "CVE-2019-14611"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013786"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-580"
},
{
"db": "NVD",
"id": "CVE-2019-14611"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2020-04683"
},
{
"db": "VULMON",
"id": "CVE-2019-14611"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013786"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-580"
},
{
"db": "NVD",
"id": "CVE-2019-14611"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-04683"
},
{
"date": "2019-12-16T00:00:00",
"db": "VULMON",
"id": "CVE-2019-14611"
},
{
"date": "2020-01-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-013786"
},
{
"date": "2019-12-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201912-580"
},
{
"date": "2019-12-16T20:15:15.413000",
"db": "NVD",
"id": "CVE-2019-14611"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-04683"
},
{
"date": "2019-12-31T00:00:00",
"db": "VULMON",
"id": "CVE-2019-14611"
},
{
"date": "2020-01-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-013786"
},
{
"date": "2020-01-02T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201912-580"
},
{
"date": "2024-11-21T04:27:02.317000",
"db": "NVD",
"id": "CVE-2019-14611"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201912-580"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Intel(R) NUC(R) Integer overflow vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013786"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201912-580"
}
],
"trust": 0.6
}
}
VAR-201912-0877
Vulnerability from variot - Updated: 2024-11-23 20:46Improper buffer restrictions in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) NUC(R) Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel NUC 8 Mainstream Game Kit and so on are a small desktop computer of Intel Corporation of the United States.
Intel NUC's firmware has a buffer limitation error vulnerability, which is caused by the program's failure to properly perform buffer limitation, and a local attacker can use this vulnerability to elevate permissions
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201912-0877",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "cd1p64gk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0053"
},
{
"model": "nuc 8 mainstream game mini computer",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0036"
},
{
"model": "cd1iv128mk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0038"
},
{
"model": "nuc6cays",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0064"
},
{
"model": "nuc7i5dnke",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0067"
},
{
"model": "nuc6i5syh",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0072"
},
{
"model": "nuc8i3cysm",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0043"
},
{
"model": "nuc8i7bek",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0077"
},
{
"model": "nuc7cjyh",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0053"
},
{
"model": "nuc6i7kyk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0066"
},
{
"model": "nuc 8 mainstream game kit",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0036"
},
{
"model": "stk2mv64cc",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0061"
},
{
"model": "nuc8i7hnk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0059"
},
{
"model": "nuc7i7dnke",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0067"
},
{
"model": "d34010wyb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0054"
},
{
"model": "cd1m3128mk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0058"
},
{
"model": "de3815tybe",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0024"
},
{
"model": "nuc7i3dnhe",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0067"
},
{
"model": "stk2m3w64cc",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0062"
},
{
"model": "cd1p64gk",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc 8 mainstream game kit",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc 8 mainstream game mini computer",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i3dnhe",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i5dnke",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i7dnke",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i3cysm",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i7bek",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i7hnk",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "stk2mv64cc",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc7cjyh",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc8i7hnk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute card cd1m3128mk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute card cd1iv128mk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute card cd1p64gk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc6cays",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc6i7kyk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc6i5syh",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute stick stk2mv64cc",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute stick stk2m3w64cc",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc mainstream game kit",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "8"
},
{
"model": "nuc mainstream game mini computer",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "8"
},
{
"model": "nuc kit nuc8i7bek",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc home nuc8i3cysm",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "8-"
},
{
"model": "nuc-kit nuc7i7dnke",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc-kit nuc7i5dnke",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc-kit nuc7i3dnhe",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc board de3815tybe",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc board d34010wyb",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i7bek",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "cd1iv128mk",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc6cays",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "d34010wyb",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc6i7kyk",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc6i5syh",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "de3815tybe",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "cd1m3128mk",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "stk2m3w64cc",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc7cjyh",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04681"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013794"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-576"
},
{
"db": "NVD",
"id": "CVE-2019-14608"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:intel:cd1p64gk_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc_8_mainstream_game_kit_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc_8_mainstream_game_mini_computer_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc7i3dnhe_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc7i5dnke_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc7i7dnke_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc8i3cysm_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc8i7bek_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc8i7hnk_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:stk2mv64cc_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013794"
}
]
},
"cve": "CVE-2019-14608",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2019-14608",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2020-04681",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2019-14608",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-14608",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-14608",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2019-14608",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2020-04681",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201912-576",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04681"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013794"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-576"
},
{
"db": "NVD",
"id": "CVE-2019-14608"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Improper buffer restrictions in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) NUC(R) Contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel NUC 8 Mainstream Game Kit and so on are a small desktop computer of Intel Corporation of the United States. \n\r\n\r\nIntel NUC\u0027s firmware has a buffer limitation error vulnerability, which is caused by the program\u0027s failure to properly perform buffer limitation, and a local attacker can use this vulnerability to elevate permissions",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-14608"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013794"
},
{
"db": "CNVD",
"id": "CNVD-2020-04681"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-14608",
"trust": 3.0
},
{
"db": "JVN",
"id": "JVNVU93632155",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013794",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2020-04681",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2019.4655",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201912-576",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04681"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013794"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-576"
},
{
"db": "NVD",
"id": "CVE-2019-14608"
}
]
},
"id": "VAR-201912-0877",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04681"
}
],
"trust": 1.373418242105263
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04681"
}
]
},
"last_update_date": "2024-11-23T20:46:44.330000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "INTEL-SA-00323",
"trust": 0.8,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html"
},
{
"title": "Patch for Intel NUC Buffer Limit Error Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/200065"
},
{
"title": "Multiple Intel Product Buffer Error Vulnerability Fix",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=106357"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04681"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013794"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-576"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-119",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013794"
},
{
"db": "NVD",
"id": "CVE-2019-14608"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-14608"
},
{
"trust": 1.6,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14608"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93632155/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.4655/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04681"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013794"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-576"
},
{
"db": "NVD",
"id": "CVE-2019-14608"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2020-04681"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013794"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-576"
},
{
"db": "NVD",
"id": "CVE-2019-14608"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-04681"
},
{
"date": "2020-01-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-013794"
},
{
"date": "2019-12-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201912-576"
},
{
"date": "2019-12-16T20:15:15.227000",
"db": "NVD",
"id": "CVE-2019-14608"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-04681"
},
{
"date": "2020-01-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-013794"
},
{
"date": "2019-12-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201912-576"
},
{
"date": "2024-11-21T04:27:01.803000",
"db": "NVD",
"id": "CVE-2019-14608"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Intel(R) NUC(R) Buffer error vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013794"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201912-576"
}
],
"trust": 0.6
}
}
VAR-201912-0878
Vulnerability from variot - Updated: 2024-11-23 20:35Improper input validation in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) NUC(R) Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel NUC 8 Mainstream Game Kit and so on are a small desktop computer of Intel Corporation of the United States
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201912-0878",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "cd1p64gk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0053"
},
{
"model": "nuc 8 mainstream game mini computer",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0036"
},
{
"model": "cd1iv128mk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0038"
},
{
"model": "nuc6cays",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0064"
},
{
"model": "nuc7i5dnke",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0067"
},
{
"model": "nuc6i5syh",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0072"
},
{
"model": "nuc8i3cysm",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0043"
},
{
"model": "nuc8i7bek",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0077"
},
{
"model": "nuc7cjyh",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0053"
},
{
"model": "nuc6i7kyk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0066"
},
{
"model": "nuc 8 mainstream game kit",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0036"
},
{
"model": "stk2mv64cc",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0061"
},
{
"model": "nuc8i7hnk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0059"
},
{
"model": "nuc7i7dnke",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0067"
},
{
"model": "d34010wyb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0054"
},
{
"model": "cd1m3128mk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0058"
},
{
"model": "de3815tybe",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0024"
},
{
"model": "nuc7i3dnhe",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0067"
},
{
"model": "stk2m3w64cc",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0062"
},
{
"model": "cd1p64gk",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc 8 mainstream game kit",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc 8 mainstream game mini computer",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i3dnhe",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i5dnke",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i7dnke",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i3cysm",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i7bek",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i7hnk",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "stk2mv64cc",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc7cjyh",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc8i7hnk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute card cd1m3128mk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute card cd1iv128mk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute card cd1p64gk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc6cays",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc6i7kyk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc6i5syh",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute stick stk2mv64cc",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute stick stk2m3w64cc",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc mainstream game kit",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "8"
},
{
"model": "nuc mainstream game mini computer",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "8"
},
{
"model": "nuc kit nuc8i7bek",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc home nuc8i3cysm",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "8-"
},
{
"model": "nuc-kit nuc7i7dnke",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc-kit nuc7i5dnke",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc-kit nuc7i3dnhe",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc board de3815tybe",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc board d34010wyb",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i7bek",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "cd1iv128mk",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc6cays",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "d34010wyb",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc6i7kyk",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc6i5syh",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "de3815tybe",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "cd1m3128mk",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "stk2m3w64cc",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc7cjyh",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04680"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013795"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-579"
},
{
"db": "NVD",
"id": "CVE-2019-14609"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:intel:cd1p64gk_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc_8_mainstream_game_kit_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc_8_mainstream_game_mini_computer_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc7i3dnhe_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc7i5dnke_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc7i7dnke_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc8i3cysm_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc8i7bek_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc8i7hnk_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:stk2mv64cc_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013795"
}
]
},
"cve": "CVE-2019-14609",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2019-14609",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2020-04680",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 0.8,
"id": "CVE-2019-14609",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 6.7,
"baseSeverity": "Medium",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-14609",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "High",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-14609",
"trust": 1.0,
"value": "MEDIUM"
},
{
"author": "NVD",
"id": "CVE-2019-14609",
"trust": 0.8,
"value": "Medium"
},
{
"author": "CNVD",
"id": "CNVD-2020-04680",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201912-579",
"trust": 0.6,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04680"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013795"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-579"
},
{
"db": "NVD",
"id": "CVE-2019-14609"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Improper input validation in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) NUC(R) Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel NUC 8 Mainstream Game Kit and so on are a small desktop computer of Intel Corporation of the United States",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-14609"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013795"
},
{
"db": "CNVD",
"id": "CNVD-2020-04680"
}
],
"trust": 2.16
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-14609",
"trust": 3.0
},
{
"db": "JVN",
"id": "JVNVU93632155",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013795",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2020-04680",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2019.4655",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201912-579",
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04680"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013795"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-579"
},
{
"db": "NVD",
"id": "CVE-2019-14609"
}
]
},
"id": "VAR-201912-0878",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04680"
}
],
"trust": 1.373418242105263
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04680"
}
]
},
"last_update_date": "2024-11-23T20:35:23.570000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "INTEL-SA-00323",
"trust": 0.8,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html"
},
{
"title": "Patch for Intel NUC Input Validation Error Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/200053"
},
{
"title": "Multiple Intel Product input verification error vulnerability fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=106358"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04680"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013795"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-579"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-20",
"trust": 1.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013795"
},
{
"db": "NVD",
"id": "CVE-2019-14609"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-14609"
},
{
"trust": 1.6,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14609"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93632155/"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.4655/"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04680"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013795"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-579"
},
{
"db": "NVD",
"id": "CVE-2019-14609"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2020-04680"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013795"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-579"
},
{
"db": "NVD",
"id": "CVE-2019-14609"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-04680"
},
{
"date": "2020-01-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-013795"
},
{
"date": "2019-12-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201912-579"
},
{
"date": "2019-12-16T20:15:15.290000",
"db": "NVD",
"id": "CVE-2019-14609"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-04680"
},
{
"date": "2020-01-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-013795"
},
{
"date": "2019-12-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201912-579"
},
{
"date": "2024-11-21T04:27:01.963000",
"db": "NVD",
"id": "CVE-2019-14609"
}
]
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Intel(R) NUC(R) Input validation vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013795"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "input validation error",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201912-579"
}
],
"trust": 0.6
}
}
VAR-201912-0880
Vulnerability from variot - Updated: 2024-11-23 20:02Improper access control in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) NUC(R) Has unspecified vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel NUC 8 Mainstream Game Kit and so on are a small desktop computer of Intel Corporation of the United States. By sending a specially-crafted request, an authenticated attacker could exploit this vulnerability to gain elevated privileges
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201912-0880",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "cd1p64gk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0053"
},
{
"model": "nuc 8 mainstream game mini computer",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0036"
},
{
"model": "cd1iv128mk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0038"
},
{
"model": "nuc6cays",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0064"
},
{
"model": "nuc7i5dnke",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0067"
},
{
"model": "nuc6i5syh",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0072"
},
{
"model": "nuc8i3cysm",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0043"
},
{
"model": "nuc8i7bek",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0077"
},
{
"model": "nuc7cjyh",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0053"
},
{
"model": "nuc6i7kyk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0066"
},
{
"model": "nuc 8 mainstream game kit",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0036"
},
{
"model": "stk2mv64cc",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0061"
},
{
"model": "nuc8i7hnk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0059"
},
{
"model": "nuc7i7dnke",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0067"
},
{
"model": "d34010wyb",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0054"
},
{
"model": "cd1m3128mk",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0058"
},
{
"model": "de3815tybe",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0024"
},
{
"model": "nuc7i3dnhe",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0067"
},
{
"model": "stk2m3w64cc",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "0062"
},
{
"model": "cd1p64gk",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc 8 mainstream game kit",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc 8 mainstream game mini computer",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i3dnhe",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i5dnke",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc7i7dnke",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i3cysm",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i7bek",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc8i7hnk",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "stk2mv64cc",
"scope": null,
"trust": 0.8,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc7cjyh",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc8i7hnk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute card cd1m3128mk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute card cd1iv128mk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute card cd1p64gk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc6cays",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc6i7kyk",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc kit nuc6i5syh",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute stick stk2mv64cc",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "compute stick stk2m3w64cc",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc mainstream game kit",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "8"
},
{
"model": "nuc mainstream game mini computer",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "8"
},
{
"model": "nuc kit nuc8i7bek",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc home nuc8i3cysm",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "8-"
},
{
"model": "nuc-kit nuc7i7dnke",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc-kit nuc7i5dnke",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc-kit nuc7i3dnhe",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc board de3815tybe",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
},
{
"model": "nuc board d34010wyb",
"scope": null,
"trust": 0.6,
"vendor": "intel",
"version": null
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04679"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013785"
},
{
"db": "NVD",
"id": "CVE-2019-14610"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/o:intel:cd1p64gk_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc_8_mainstream_game_kit_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc_8_mainstream_game_mini_computer_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc7i3dnhe_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc7i5dnke_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc7i7dnke_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc8i3cysm_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc8i7bek_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:nuc8i7hnk_firmware",
"vulnerable": true
},
{
"cpe22Uri": "cpe:/o:intel:stk2mv64cc_firmware",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013785"
}
]
},
"cve": "CVE-2019-14610",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CVE-2019-14610",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 1.9,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "CNVD-2020-04679",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2019-14610",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "CVE-2019-14610",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2019-14610",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2019-14610",
"trust": 0.8,
"value": "High"
},
{
"author": "CNVD",
"id": "CNVD-2020-04679",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201912-581",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULMON",
"id": "CVE-2019-14610",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04679"
},
{
"db": "VULMON",
"id": "CVE-2019-14610"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013785"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-581"
},
{
"db": "NVD",
"id": "CVE-2019-14610"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Improper access control in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) NUC(R) Has unspecified vulnerabilities.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel NUC 8 Mainstream Game Kit and so on are a small desktop computer of Intel Corporation of the United States. By sending a specially-crafted request, an authenticated attacker could exploit this vulnerability to gain elevated privileges",
"sources": [
{
"db": "NVD",
"id": "CVE-2019-14610"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013785"
},
{
"db": "CNVD",
"id": "CNVD-2020-04679"
},
{
"db": "VULMON",
"id": "CVE-2019-14610"
}
],
"trust": 2.25
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2019-14610",
"trust": 3.1
},
{
"db": "JVN",
"id": "JVNVU93632155",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013785",
"trust": 0.8
},
{
"db": "CNVD",
"id": "CNVD-2020-04679",
"trust": 0.6
},
{
"db": "AUSCERT",
"id": "ESB-2019.4655",
"trust": 0.6
},
{
"db": "CNNVD",
"id": "CNNVD-201912-581",
"trust": 0.6
},
{
"db": "VULMON",
"id": "CVE-2019-14610",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04679"
},
{
"db": "VULMON",
"id": "CVE-2019-14610"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013785"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-581"
},
{
"db": "NVD",
"id": "CVE-2019-14610"
}
]
},
"id": "VAR-201912-0880",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04679"
}
],
"trust": 1.373418242105263
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04679"
}
]
},
"last_update_date": "2024-11-23T20:02:19.849000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "INTEL-SA-00323",
"trust": 0.8,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html"
},
{
"title": "Patch for Intel NUC Access Control Error Vulnerability",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchInfo/show/200041"
},
{
"title": "Multiple Intel Product input verification error vulnerability fixes",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=105792"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04679"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013785"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-581"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-Other",
"trust": 1.0
},
{
"problemtype": "CWE-Other",
"trust": 0.8
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013785"
},
{
"db": "NVD",
"id": "CVE-2019-14610"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 2.0,
"url": "https://nvd.nist.gov/vuln/detail/cve-2019-14610"
},
{
"trust": 1.7,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14610"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu93632155/"
},
{
"trust": 0.6,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00324.html"
},
{
"trust": 0.6,
"url": "https://www.auscert.org.au/bulletins/esb-2019.4655/"
},
{
"trust": 0.1,
"url": "https://cwe.mitre.org/data/definitions/.html"
},
{
"trust": 0.1,
"url": "https://nvd.nist.gov"
},
{
"trust": 0.1,
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/172926"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2020-04679"
},
{
"db": "VULMON",
"id": "CVE-2019-14610"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013785"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-581"
},
{
"db": "NVD",
"id": "CVE-2019-14610"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2020-04679"
},
{
"db": "VULMON",
"id": "CVE-2019-14610"
},
{
"db": "JVNDB",
"id": "JVNDB-2019-013785"
},
{
"db": "CNNVD",
"id": "CNNVD-201912-581"
},
{
"db": "NVD",
"id": "CVE-2019-14610"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-04679"
},
{
"date": "2019-12-16T00:00:00",
"db": "VULMON",
"id": "CVE-2019-14610"
},
{
"date": "2020-01-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-013785"
},
{
"date": "2019-12-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201912-581"
},
{
"date": "2019-12-16T20:15:15.337000",
"db": "NVD",
"id": "CVE-2019-14610"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-02-12T00:00:00",
"db": "CNVD",
"id": "CNVD-2020-04679"
},
{
"date": "2020-01-02T00:00:00",
"db": "VULMON",
"id": "CVE-2019-14610"
},
{
"date": "2020-01-16T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2019-013785"
},
{
"date": "2020-05-15T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201912-581"
},
{
"date": "2024-11-21T04:27:02.127000",
"db": "NVD",
"id": "CVE-2019-14610"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201912-581"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Intel(R) NUC(R) Vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2019-013785"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201912-581"
}
],
"trust": 0.6
}
}