VAR-201610-0228
Vulnerability from variot - Updated: 2025-04-13 23:32The updater subsystem in Intel SSD Toolbox before 3.3.7 allows local users to gain privileges via unspecified vectors. Attackers can exploit this issue to gain elevated privileges within the context of the operating system. Intel SSD Toolbox 3.1.0 through 3.3.6 are vulnerable
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201610-0228",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "solid-state drive toolbox",
"scope": "lte",
"trust": 1.0,
"vendor": "intel",
"version": "3.3.6"
},
{
"model": "ssd toolbox",
"scope": "lt",
"trust": 0.8,
"vendor": "intel",
"version": "3.3.7"
},
{
"model": "solid-state drive toolbox",
"scope": "eq",
"trust": 0.6,
"vendor": "intel",
"version": "3.3.6"
},
{
"model": "solid state drive toolbox",
"scope": "eq",
"trust": 0.3,
"vendor": "intel",
"version": "3.3.6"
},
{
"model": "solid state drive toolbox",
"scope": "eq",
"trust": 0.3,
"vendor": "intel",
"version": "3.3.5"
},
{
"model": "solid state drive toolbox",
"scope": "eq",
"trust": 0.3,
"vendor": "intel",
"version": "3.3.2"
},
{
"model": "solid state drive toolbox",
"scope": "eq",
"trust": 0.3,
"vendor": "intel",
"version": "3.3.1"
},
{
"model": "solid state drive toolbox",
"scope": "eq",
"trust": 0.3,
"vendor": "intel",
"version": "3.3"
},
{
"model": "solid state drive toolbox",
"scope": "eq",
"trust": 0.3,
"vendor": "intel",
"version": "3.2.1"
},
{
"model": "solid state drive toolbox",
"scope": "eq",
"trust": 0.3,
"vendor": "intel",
"version": "3.1"
},
{
"model": "solid state drive toolbox",
"scope": "ne",
"trust": 0.3,
"vendor": "intel",
"version": "3.3.7"
}
],
"sources": [
{
"db": "BID",
"id": "93482"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005374"
},
{
"db": "CNNVD",
"id": "CNNVD-201610-235"
},
{
"db": "NVD",
"id": "CVE-2016-8101"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"cpe_match": [
{
"cpe22Uri": "cpe:/a:intel:solid-state_drive_toolbox",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-005374"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Florian Bogner",
"sources": [
{
"db": "BID",
"id": "93482"
}
],
"trust": 0.3
},
"cve": "CVE-2016-8101",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "nvd@nist.gov",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "CVE-2016-8101",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 1.8,
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 3.9,
"id": "VHN-96921",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "nvd@nist.gov",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"id": "CVE-2016-8101",
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.8,
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "nvd@nist.gov",
"id": "CVE-2016-8101",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "CVE-2016-8101",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-201610-235",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-96921",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-96921"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005374"
},
{
"db": "CNNVD",
"id": "CNNVD-201610-235"
},
{
"db": "NVD",
"id": "CVE-2016-8101"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "The updater subsystem in Intel SSD Toolbox before 3.3.7 allows local users to gain privileges via unspecified vectors. \nAttackers can exploit this issue to gain elevated privileges within the context of the operating system. \nIntel SSD Toolbox 3.1.0 through 3.3.6 are vulnerable",
"sources": [
{
"db": "NVD",
"id": "CVE-2016-8101"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005374"
},
{
"db": "BID",
"id": "93482"
},
{
"db": "VULHUB",
"id": "VHN-96921"
}
],
"trust": 1.98
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2016-8101",
"trust": 2.8
},
{
"db": "BID",
"id": "93482",
"trust": 1.4
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005374",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201610-235",
"trust": 0.7
},
{
"db": "VULHUB",
"id": "VHN-96921",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-96921"
},
{
"db": "BID",
"id": "93482"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005374"
},
{
"db": "CNNVD",
"id": "CNNVD-201610-235"
},
{
"db": "NVD",
"id": "CVE-2016-8101"
}
]
},
"id": "VAR-201610-0228",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-96921"
}
],
"trust": 0.01
},
"last_update_date": "2025-04-13T23:32:37.080000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "INTEL-SA-00061",
"trust": 0.8,
"url": "https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00061\u0026languageid=en-fr"
},
{
"title": "Intel SSD Toolbox Security vulnerabilities",
"trust": 0.6,
"url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=64634"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-005374"
},
{
"db": "CNNVD",
"id": "CNNVD-201610-235"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "CWE-264",
"trust": 1.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-96921"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005374"
},
{
"db": "NVD",
"id": "CVE-2016-8101"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00061\u0026languageid=en-fr"
},
{
"trust": 1.1,
"url": "http://www.securityfocus.com/bid/93482"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2016-8101"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2016-8101"
},
{
"trust": 0.3,
"url": "http://www.intel.com/content/www/us/en/homepage.html"
},
{
"trust": 0.3,
"url": "http://www.intel.com/content/www/us/en/support/solid-state-drives/ssd-software/intel-ssd-toolbox.html"
},
{
"trust": 0.1,
"url": "https://security-center.intel.com/advisory.aspx?intelid=intel-sa-00061\u0026amp;languageid=en-fr"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-96921"
},
{
"db": "BID",
"id": "93482"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005374"
},
{
"db": "CNNVD",
"id": "CNNVD-201610-235"
},
{
"db": "NVD",
"id": "CVE-2016-8101"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-96921"
},
{
"db": "BID",
"id": "93482"
},
{
"db": "JVNDB",
"id": "JVNDB-2016-005374"
},
{
"db": "CNNVD",
"id": "CNNVD-201610-235"
},
{
"db": "NVD",
"id": "CVE-2016-8101"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-10-10T00:00:00",
"db": "VULHUB",
"id": "VHN-96921"
},
{
"date": "2016-10-04T00:00:00",
"db": "BID",
"id": "93482"
},
{
"date": "2016-10-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-005374"
},
{
"date": "2016-10-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201610-235"
},
{
"date": "2016-10-10T16:59:04.730000",
"db": "NVD",
"id": "CVE-2016-8101"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2016-12-02T00:00:00",
"db": "VULHUB",
"id": "VHN-96921"
},
{
"date": "2016-10-26T11:02:00",
"db": "BID",
"id": "93482"
},
{
"date": "2016-10-19T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2016-005374"
},
{
"date": "2016-10-11T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201610-235"
},
{
"date": "2025-04-12T10:46:40.837000",
"db": "NVD",
"id": "CVE-2016-8101"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "BID",
"id": "93482"
},
{
"db": "CNNVD",
"id": "CNNVD-201610-235"
}
],
"trust": 0.9
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Intel SSD Toolbox of updater Subsystem vulnerability",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2016-005374"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "permissions and access control",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201610-235"
}
],
"trust": 0.6
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…