Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-12202 (GCVE-0-2018-12202)
Vulnerability from cvelistv5 – Published: 2019-03-14 20:00 – Updated: 2024-09-17 04:25
VLAI?
EPSS
Summary
Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow privileged user to potentially leverage existing features via local access.
Severity ?
No CVSS data available.
CWE
- Escalation of privilege
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Intel Corporation | Intel Platform Sample / Silicon Reference firmware |
Affected:
Multiple versions.
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T08:30:59.258Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel Platform Sample / Silicon Reference firmware",
"vendor": "Intel Corporation",
"versions": [
{
"status": "affected",
"version": "Multiple versions."
}
]
}
],
"datePublic": "2019-03-12T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow privileged user to potentially leverage existing features via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2019-04-03T21:06:09.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2019-03-12T00:00:00",
"ID": "CVE-2018-12202",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel Platform Sample / Silicon Reference firmware",
"version": {
"version_data": [
{
"version_value": "Multiple versions."
}
]
}
}
]
},
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow privileged user to potentially leverage existing features via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190318-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2018-12202",
"datePublished": "2019-03-14T20:00:00.000Z",
"dateReserved": "2018-06-11T00:00:00.000Z",
"dateUpdated": "2024-09-17T04:25:02.209Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GHSA-X2G7-FXWW-QH56
Vulnerability from github – Published: 2022-05-13 01:49 – Updated: 2022-05-13 01:49
VLAI?
Details
Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow privileged user to potentially leverage existing features via local access.
Severity ?
6.7 (Medium)
{
"affected": [],
"aliases": [
"CVE-2018-12202"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2019-03-14T20:29:00Z",
"severity": "HIGH"
},
"details": "Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow privileged user to potentially leverage existing features via local access.",
"id": "GHSA-x2g7-fxww-qh56",
"modified": "2022-05-13T01:49:30Z",
"published": "2022-05-13T01:49:30Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-12202"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20190318-0002"
},
{
"type": "WEB",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CERTFR-2019-AVI-108
Vulnerability from certfr_avis - Published: 2019-03-13 - Updated: 2019-03-13
De multiples vulnérabilités ont été découvertes dans les produits Intel. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un déni de service.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Processeur Intel Celeron J4105 | ||
| Intel | N/A | Intel CSME versions 11.0 à 11.8.55 | ||
| Intel | N/A | Intel CSME versions 11.20 à 11.22.0 | ||
| Intel | N/A | Intel Data Center Manager SDK versions antérieures à 5.0.2 | ||
| Intel | N/A | Intel CSME versions 12.0 à 12.0.10 | ||
| Intel | N/A | Processeur Intel Celeron N4000 | ||
| Intel | N/A | Intel Accelerated Storage Manager RSTe versions 5.5 et antérieures | ||
| Intel | N/A | Intel Server Board | ||
| Intel | N/A | Intel Server System | ||
| Intel | N/A | Processeur Intel Core de 7ème génération | ||
| Intel | N/A | Intel Compute ModuleIntel Graphics Driver pour Windows versions antérieures à 10.18.x.5059 (aussi connu comme 15.33.x.5059), 10.18.x.5057 (aussi connu comme 15.36.x.5057), 20.19.x.5063 (aussi connu comme 15.40.x.5063) 21.20.x.5064 (aussi connu comme 15.45.x.5064) et 24.20.100.6373 | ||
| Intel | N/A | Intel CSME versions 11.10 à 11.11.55 | ||
| Intel | N/A | Intel Trusted Execution Engine versions 4.0 à 4.0.5 | ||
| Intel | N/A | Processeur Intel Core de 8ème génération | ||
| Intel | N/A | Processeur Intel Pentium Silver N5000 | ||
| Intel | N/A | Composant Intel Unite Solution software server version 3.2 à 3.3 | ||
| Intel | N/A | Processeur Intel Celeron N4100 | ||
| Intel | N/A | Intel Server Platform Services versions SPS 4.01.00.152.0 à SPS 4.01.02.173 | ||
| Intel | N/A | Intel Server Platform Services versions SPS 4.00.04.367 à SPS 4.00.04.382 | ||
| Intel | N/A | Processeur Intel Pentium Silver J5005 | ||
| Intel | N/A | Processeur Intel Celeron J4005 | ||
| Intel | N/A | Intel Trusted Execution Engine versions 3.0 à 3.1.50 |
References
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Processeur Intel Celeron J4105",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 11.0 \u00e0 11.8.55",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 11.20 \u00e0 11.22.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center Manager SDK versions ant\u00e9rieures \u00e0 5.0.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 12.0 \u00e0 12.0.10",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron N4000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Accelerated Storage Manager RSTe versions 5.5 et ant\u00e9rieures",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server System",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 7\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Compute ModuleIntel Graphics Driver pour Windows versions ant\u00e9rieures \u00e0 10.18.x.5059 (aussi connu comme 15.33.x.5059), 10.18.x.5057 (aussi connu comme 15.36.x.5057), 20.19.x.5063 (aussi connu comme 15.40.x.5063) 21.20.x.5064 (aussi connu comme 15.45.x.5064) et 24.20.100.6373",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel CSME versions 11.10 \u00e0 11.11.55",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Trusted Execution Engine versions 4.0 \u00e0 4.0.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Core de 8\u00e8me g\u00e9n\u00e9ration",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Pentium Silver N5000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Composant Intel Unite Solution software server version 3.2 \u00e0 3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron N4100",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Platform Services versions SPS 4.01.00.152.0 \u00e0 SPS 4.01.02.173",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Platform Services versions SPS 4.00.04.367 \u00e0 SPS 4.00.04.382",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Pentium Silver J5005",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Processeur Intel Celeron J4005",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Trusted Execution Engine versions 3.0 \u00e0 3.1.50",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-12223",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12223"
},
{
"name": "CVE-2019-0108",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0108"
},
{
"name": "CVE-2018-12215",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12215"
},
{
"name": "CVE-2018-12188",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12188"
},
{
"name": "CVE-2018-12205",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12205"
},
{
"name": "CVE-2019-0103",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0103"
},
{
"name": "CVE-2018-12222",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12222"
},
{
"name": "CVE-2018-12212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12212"
},
{
"name": "CVE-2018-12213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12213"
},
{
"name": "CVE-2018-12202",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12202"
},
{
"name": "CVE-2018-12199",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12199"
},
{
"name": "CVE-2018-12221",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12221"
},
{
"name": "CVE-2019-0107",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0107"
},
{
"name": "CVE-2018-12191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12191"
},
{
"name": "CVE-2018-12200",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12200"
},
{
"name": "CVE-2018-12204",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12204"
},
{
"name": "CVE-2018-12214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12214"
},
{
"name": "CVE-2019-0105",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0105"
},
{
"name": "CVE-2018-18089",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18089"
},
{
"name": "CVE-2019-0109",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0109"
},
{
"name": "CVE-2018-12187",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12187"
},
{
"name": "CVE-2018-12219",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12219"
},
{
"name": "CVE-2019-0102",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0102"
},
{
"name": "CVE-2018-12192",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12192"
},
{
"name": "CVE-2018-12208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12208"
},
{
"name": "CVE-2019-0101",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0101"
},
{
"name": "CVE-2018-12217",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12217"
},
{
"name": "CVE-2018-12189",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12189"
},
{
"name": "CVE-2018-12196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12196"
},
{
"name": "CVE-2019-0135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0135"
},
{
"name": "CVE-2018-12201",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12201"
},
{
"name": "CVE-2018-12211",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12211"
},
{
"name": "CVE-2019-0106",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0106"
},
{
"name": "CVE-2018-12203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12203"
},
{
"name": "CVE-2018-12209",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12209"
},
{
"name": "CVE-2019-0112",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0112"
},
{
"name": "CVE-2019-0110",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0110"
},
{
"name": "CVE-2018-12185",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12185"
},
{
"name": "CVE-2019-0111",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0111"
},
{
"name": "CVE-2018-12218",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12218"
},
{
"name": "CVE-2018-12220",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12220"
},
{
"name": "CVE-2018-12216",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12216"
},
{
"name": "CVE-2018-12224",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12224"
},
{
"name": "CVE-2019-0104",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0104"
},
{
"name": "CVE-2018-12210",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12210"
},
{
"name": "CVE-2018-12198",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12198"
},
{
"name": "CVE-2018-18090",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18090"
},
{
"name": "CVE-2018-12190",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12190"
},
{
"name": "CVE-2018-18091",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18091"
}
],
"initial_release_date": "2019-03-13T00:00:00",
"last_revision_date": "2019-03-13T00:00:00",
"links": [],
"reference": "CERTFR-2019-AVI-108",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2019-03-13T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire, un d\u00e9ni de service \u00e0 distance et un d\u00e9ni\nde service.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00189 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00189.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00231 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00231.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00215 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00215.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00185 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00185.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00214 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00214.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel INTEL-SA-00191 du 12 mars 2019",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00191.html"
}
]
}
GSD-2018-12202
Vulnerability from gsd - Updated: 2023-12-13 01:22Details
Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow privileged user to potentially leverage existing features via local access.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2018-12202",
"description": "Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow privileged user to potentially leverage existing features via local access.",
"id": "GSD-2018-12202"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-12202"
],
"details": "Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow privileged user to potentially leverage existing features via local access.",
"id": "GSD-2018-12202",
"modified": "2023-12-13T01:22:30.688310Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"DATE_PUBLIC": "2019-03-12T00:00:00",
"ID": "CVE-2018-12202",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel Platform Sample / Silicon Reference firmware",
"version": {
"version_data": [
{
"version_value": "Multiple versions."
}
]
}
}
]
},
"vendor_name": "Intel Corporation"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow privileged user to potentially leverage existing features via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html",
"refsource": "CONFIRM",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190318-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us",
"refsource": "CONFIRM",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:platform_sample_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:platform_sample_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7640x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7740x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7800x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:silicon_reference_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:silicon_reference_firmware:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7640x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7740x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:intel:core_i7:7800x:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2018-12202"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow privileged user to potentially leverage existing features via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
},
{
"name": "https://security.netapp.com/advisory/ntap-20190318-0002/",
"refsource": "CONFIRM",
"tags": [],
"url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
},
{
"name": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us",
"refsource": "CONFIRM",
"tags": [],
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2019-10-03T00:03Z",
"publishedDate": "2019-03-14T20:29Z"
}
}
}
CVE-2018-12202
Vulnerability from fstec - Published: 12.03.2019
VLAI Severity ?
Title
Уязвимость микропрограммного обеспечения Platform Sample/Silicon Reference процессоров Intel Core, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии
Description
Уязвимость микропрограммного обеспечения Platform Sample/Silicon Reference процессоров Intel Core связана с недостатками разграничения доступа. Эксплуатация уязвимости может позволить нарушителю повысить свои привилегии
Severity ?
Vendor
Intel Corp.
Software Name
Intel Core
Software Version
- (Intel Core)
Possible Mitigations
Использование рекомендаций:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00191.html
Reference
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00191.html
https://nvd.nist.gov/vuln/detail/CVE-2018-12202
CWE
CWE-264
{
"CVSS 2.0": "AV:L/AC:H/Au:N/C:N/I:C/A:C",
"CVSS 3.0": "AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Intel Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (Intel Core)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439: \nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00191.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "12.03.2019",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "23.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "12.04.2019",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2019-01385",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2018-12202",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Intel Core",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Platform Sample/Silicon Reference \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 Intel Core, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0437\u0440\u0435\u0448\u0435\u043d\u0438\u044f, \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0438 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u043e\u043c (CWE-264)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f Platform Sample/Silicon Reference \u043f\u0440\u043e\u0446\u0435\u0441\u0441\u043e\u0440\u043e\u0432 Intel Core \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u0440\u0430\u0437\u0433\u0440\u0430\u043d\u0438\u0447\u0435\u043d\u0438\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": "-",
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00191.html\nhttps://nvd.nist.gov/vuln/detail/CVE-2018-12202",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u041e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-264",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,6)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,7)"
}
FKIE_CVE-2018-12202
Vulnerability from fkie_nvd - Published: 2019-03-14 20:29 - Updated: 2024-11-21 03:44
Severity ?
Summary
Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow privileged user to potentially leverage existing features via local access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:platform_sample_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CDA75B0-0DB9-4E0E-BF2C-724572FFB46F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*",
"matchCriteriaId": "0DA0AF32-485E-418D-B3F5-F7207CF17E4A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*",
"matchCriteriaId": "353CB864-53C3-4BC3-B02A-38FEE42BDBCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*",
"matchCriteriaId": "3A649B47-E110-4C6C-AE60-13DB543CFE29",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*",
"matchCriteriaId": "02377127-6C03-4FED-BB51-555B8E0DB223",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*",
"matchCriteriaId": "07CCBA16-2DC6-43D5-BFF2-550C749DB54E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*",
"matchCriteriaId": "100127DD-4981-46D3-95A7-D5C0585F097E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*",
"matchCriteriaId": "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*",
"matchCriteriaId": "A529E849-E1FD-4BD1-A6A5-377F79FE26D2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*",
"matchCriteriaId": "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*",
"matchCriteriaId": "A216FA06-4E47-4105-8ADE-956F887AFC6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*",
"matchCriteriaId": "137DECAA-074A-4FEC-A633-FE3836E0D32B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*",
"matchCriteriaId": "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*",
"matchCriteriaId": "328F854B-3716-47D9-BE70-765DE3689DAC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*",
"matchCriteriaId": "D179F530-F642-444C-8184-3770FA8A338E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*",
"matchCriteriaId": "CB237F89-7405-46F7-972E-81A3B78631BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*",
"matchCriteriaId": "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*",
"matchCriteriaId": "017FA232-935C-4096-8087-5F90147589C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*",
"matchCriteriaId": "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*",
"matchCriteriaId": "7C86118F-42C7-4F7E-B156-AA7AC53BE96B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*",
"matchCriteriaId": "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*",
"matchCriteriaId": "B506523F-101E-4F05-82D5-31E37B8B2E8C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED47811-5435-43D1-A57F-CA89807A6118",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*",
"matchCriteriaId": "6799338F-C0F9-4B25-A14C-68C4158B01F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*",
"matchCriteriaId": "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*",
"matchCriteriaId": "5461E4AD-2944-46A0-A696-FC32CD069D64",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A76E12-842B-4925-B5F5-53497C3E420F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*",
"matchCriteriaId": "28F8C010-77B1-4774-AE6D-2A8375F5E8B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*",
"matchCriteriaId": "19CC5153-BE9A-4394-BFA5-1F0DBEA16163",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*",
"matchCriteriaId": "361C2658-F122-4AE9-B67D-4467F29E096D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*",
"matchCriteriaId": "66106AD9-F1DA-4A43-9968-7F5BD31D92CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*",
"matchCriteriaId": "C47C2864-4B34-46DD-AABF-9F38B72578AC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*",
"matchCriteriaId": "77AFA400-C880-48AE-B32F-0AC8DF073CCB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:platform_sample_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1CDA75B0-0DB9-4E0E-BF2C-724572FFB46F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
"matchCriteriaId": "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
"matchCriteriaId": "233009BD-0DEC-405C-AD1A-B58AEB48B0DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
"matchCriteriaId": "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
"matchCriteriaId": "A3D29927-72F4-4AF9-B096-57DB2712FBE1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
"matchCriteriaId": "BA5AE231-F198-49EC-8A97-FF250A742840",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
"matchCriteriaId": "22A6603F-9646-4220-BFCB-81266F1FC60E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
"matchCriteriaId": "68E25472-7F96-425C-87DD-D1835B12589E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
"matchCriteriaId": "09253F55-3355-44C1-862C-9A6DAD5C461C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
"matchCriteriaId": "32CAE041-761F-4D81-B075-D3E567CFFE94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
"matchCriteriaId": "843E440C-3847-4B13-BB0C-E0C282853850",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB1AF20-A65B-45F7-8C60-3475A640E2FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
"matchCriteriaId": "154B92C1-04B9-459D-9FC7-6EA1E09CE12C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0F9407-BCB5-4F50-8D54-74389DA58E15",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
"matchCriteriaId": "60F6B441-537F-4255-9BC6-CE807B46DC55",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
"matchCriteriaId": "CE7EFD6E-5954-4041-8245-0AB2D45E583F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
"matchCriteriaId": "83A2B089-EF84-4CC6-BFF6-8E74584688CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
"matchCriteriaId": "5427051C-F785-4190-86E4-7F6E226968B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
"matchCriteriaId": "B4E5D44F-183D-4B1B-8ACF-6954A834B63A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
"matchCriteriaId": "96AEABB2-D597-4126-AEA2-D67117E86962",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
"matchCriteriaId": "1E84AC40-E06A-42B9-B125-E7263A191702",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
"matchCriteriaId": "F1869D54-7B07-400D-8941-59DE0FE4127D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
"matchCriteriaId": "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC66A91-0BA2-4073-B4B7-E8354B3D2409",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD36097-3356-49B6-93A4-B6AC9203C2A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
"matchCriteriaId": "9C0CE988-82FB-4412-AF06-91A1E056FD0B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
"matchCriteriaId": "799CBCB6-5345-433A-9D2A-B36A86178982",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
"matchCriteriaId": "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
"matchCriteriaId": "16F2AE62-2E44-4F70-B790-1D5399DF61A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
"matchCriteriaId": "1EBF09B5-A51E-4579-A5E4-3B755CDDB737",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
"matchCriteriaId": "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
"matchCriteriaId": "7AC49B2C-12AB-463F-AB13-7C9A9E381014",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7640x:*:*:*:*:*:*:*",
"matchCriteriaId": "2A645E70-B00F-4EE8-9C06-B6382791637A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7740x:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB59CA7-8335-43F6-A410-DF7BD12855FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7800x:*:*:*:*:*:*:*",
"matchCriteriaId": "C39ED459-DE01-4037-A01F-C13BD2E36508",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820x:*:*:*:*:*:*:*",
"matchCriteriaId": "93396E3B-72F7-4BDA-A872-3E0DE12884C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:silicon_reference_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB336210-AC71-4DFA-878F-647EC94DF495",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*",
"matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*",
"matchCriteriaId": "0DA0AF32-485E-418D-B3F5-F7207CF17E4A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*",
"matchCriteriaId": "353CB864-53C3-4BC3-B02A-38FEE42BDBCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*",
"matchCriteriaId": "3A649B47-E110-4C6C-AE60-13DB543CFE29",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*",
"matchCriteriaId": "02377127-6C03-4FED-BB51-555B8E0DB223",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*",
"matchCriteriaId": "07CCBA16-2DC6-43D5-BFF2-550C749DB54E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*",
"matchCriteriaId": "100127DD-4981-46D3-95A7-D5C0585F097E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*",
"matchCriteriaId": "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*",
"matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*",
"matchCriteriaId": "A529E849-E1FD-4BD1-A6A5-377F79FE26D2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*",
"matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*",
"matchCriteriaId": "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*",
"matchCriteriaId": "A216FA06-4E47-4105-8ADE-956F887AFC6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*",
"matchCriteriaId": "137DECAA-074A-4FEC-A633-FE3836E0D32B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*",
"matchCriteriaId": "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*",
"matchCriteriaId": "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*",
"matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*",
"matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*",
"matchCriteriaId": "328F854B-3716-47D9-BE70-765DE3689DAC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*",
"matchCriteriaId": "D179F530-F642-444C-8184-3770FA8A338E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*",
"matchCriteriaId": "CB237F89-7405-46F7-972E-81A3B78631BA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*",
"matchCriteriaId": "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*",
"matchCriteriaId": "017FA232-935C-4096-8087-5F90147589C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*",
"matchCriteriaId": "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*",
"matchCriteriaId": "7C86118F-42C7-4F7E-B156-AA7AC53BE96B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*",
"matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*",
"matchCriteriaId": "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*",
"matchCriteriaId": "B506523F-101E-4F05-82D5-31E37B8B2E8C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*",
"matchCriteriaId": "1ED47811-5435-43D1-A57F-CA89807A6118",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*",
"matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*",
"matchCriteriaId": "6799338F-C0F9-4B25-A14C-68C4158B01F6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*",
"matchCriteriaId": "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*",
"matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*",
"matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*",
"matchCriteriaId": "5461E4AD-2944-46A0-A696-FC32CD069D64",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*",
"matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*",
"matchCriteriaId": "E2A76E12-842B-4925-B5F5-53497C3E420F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*",
"matchCriteriaId": "28F8C010-77B1-4774-AE6D-2A8375F5E8B5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*",
"matchCriteriaId": "19CC5153-BE9A-4394-BFA5-1F0DBEA16163",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*",
"matchCriteriaId": "361C2658-F122-4AE9-B67D-4467F29E096D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*",
"matchCriteriaId": "66106AD9-F1DA-4A43-9968-7F5BD31D92CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*",
"matchCriteriaId": "C47C2864-4B34-46DD-AABF-9F38B72578AC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*",
"matchCriteriaId": "77AFA400-C880-48AE-B32F-0AC8DF073CCB",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:silicon_reference_firmware:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EB336210-AC71-4DFA-878F-647EC94DF495",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:core_i3:7020u:*:*:*:*:*:*:*",
"matchCriteriaId": "A54EC3F7-0B8C-46CE-A8C7-4BB61B355843",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100:*:*:*:*:*:*:*",
"matchCriteriaId": "233009BD-0DEC-405C-AD1A-B58AEB48B0DC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100e:*:*:*:*:*:*:*",
"matchCriteriaId": "D332B6F4-DB19-4E02-A2B6-23D7235BCAB0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100h:*:*:*:*:*:*:*",
"matchCriteriaId": "A3D29927-72F4-4AF9-B096-57DB2712FBE1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100t:*:*:*:*:*:*:*",
"matchCriteriaId": "BA5AE231-F198-49EC-8A97-FF250A742840",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7100u:*:*:*:*:*:*:*",
"matchCriteriaId": "22A6603F-9646-4220-BFCB-81266F1FC60E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7101e:*:*:*:*:*:*:*",
"matchCriteriaId": "68E25472-7F96-425C-87DD-D1835B12589E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7101te:*:*:*:*:*:*:*",
"matchCriteriaId": "09253F55-3355-44C1-862C-9A6DAD5C461C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7102e:*:*:*:*:*:*:*",
"matchCriteriaId": "32CAE041-761F-4D81-B075-D3E567CFFE94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7130u:*:*:*:*:*:*:*",
"matchCriteriaId": "843E440C-3847-4B13-BB0C-E0C282853850",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7167u:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB1AF20-A65B-45F7-8C60-3475A640E2FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7300:*:*:*:*:*:*:*",
"matchCriteriaId": "154B92C1-04B9-459D-9FC7-6EA1E09CE12C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7300t:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0F9407-BCB5-4F50-8D54-74389DA58E15",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7320:*:*:*:*:*:*:*",
"matchCriteriaId": "60F6B441-537F-4255-9BC6-CE807B46DC55",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i3:7350k:*:*:*:*:*:*:*",
"matchCriteriaId": "CE7EFD6E-5954-4041-8245-0AB2D45E583F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7200u:*:*:*:*:*:*:*",
"matchCriteriaId": "83A2B089-EF84-4CC6-BFF6-8E74584688CD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7260u:*:*:*:*:*:*:*",
"matchCriteriaId": "6D2A5D20-2921-4FA2-B62F-01A6A2957D7B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7267u:*:*:*:*:*:*:*",
"matchCriteriaId": "5427051C-F785-4190-86E4-7F6E226968B4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7287u:*:*:*:*:*:*:*",
"matchCriteriaId": "B4E5D44F-183D-4B1B-8ACF-6954A834B63A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7300hq:*:*:*:*:*:*:*",
"matchCriteriaId": "96AEABB2-D597-4126-AEA2-D67117E86962",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7300u:*:*:*:*:*:*:*",
"matchCriteriaId": "1E84AC40-E06A-42B9-B125-E7263A191702",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7360u:*:*:*:*:*:*:*",
"matchCriteriaId": "F1869D54-7B07-400D-8941-59DE0FE4127D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7400:*:*:*:*:*:*:*",
"matchCriteriaId": "A27F73DD-FDC1-4A7B-85B1-543FFB036CCC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7400t:*:*:*:*:*:*:*",
"matchCriteriaId": "AEC66A91-0BA2-4073-B4B7-E8354B3D2409",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7440eq:*:*:*:*:*:*:*",
"matchCriteriaId": "CAD36097-3356-49B6-93A4-B6AC9203C2A9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7440hq:*:*:*:*:*:*:*",
"matchCriteriaId": "9C0CE988-82FB-4412-AF06-91A1E056FD0B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7442eq:*:*:*:*:*:*:*",
"matchCriteriaId": "799CBCB6-5345-433A-9D2A-B36A86178982",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7500:*:*:*:*:*:*:*",
"matchCriteriaId": "BE27EBE2-D4BD-412C-8DB0-C30DF71E5788",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7500t:*:*:*:*:*:*:*",
"matchCriteriaId": "16F2AE62-2E44-4F70-B790-1D5399DF61A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7600:*:*:*:*:*:*:*",
"matchCriteriaId": "1EBF09B5-A51E-4579-A5E4-3B755CDDB737",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7600k:*:*:*:*:*:*:*",
"matchCriteriaId": "3F4D20EC-92C4-4BB3-8F13-540AAA001E9F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7600t:*:*:*:*:*:*:*",
"matchCriteriaId": "7AC49B2C-12AB-463F-AB13-7C9A9E381014",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i5:7640x:*:*:*:*:*:*:*",
"matchCriteriaId": "2A645E70-B00F-4EE8-9C06-B6382791637A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7500u:*:*:*:*:*:*:*",
"matchCriteriaId": "6158ED8A-007E-48B7-99BF-8BA03BF584BD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7560u:*:*:*:*:*:*:*",
"matchCriteriaId": "DBA7096A-F321-49A0-911A-F9683ABE6E6A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7567u:*:*:*:*:*:*:*",
"matchCriteriaId": "6A471395-7F8F-4BA5-962D-4D8F271FAB47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7600u:*:*:*:*:*:*:*",
"matchCriteriaId": "B9484380-92B9-44DB-8E20-DC8DE02D1CA6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7660u:*:*:*:*:*:*:*",
"matchCriteriaId": "8010808D-805D-4CA3-9EA2-55EB1E57964C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700:*:*:*:*:*:*:*",
"matchCriteriaId": "9716FE9F-A056-42A3-A241-F2FE37A6386A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700hq:*:*:*:*:*:*:*",
"matchCriteriaId": "F73422A3-ECA0-4C41-9AA5-CF7D77885CF6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700k:*:*:*:*:*:*:*",
"matchCriteriaId": "7A96A5AF-C9EF-4DED-AE25-4540A2B02915",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7700t:*:*:*:*:*:*:*",
"matchCriteriaId": "D5115B12-053A-4866-A833-D6EC88D8F93E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7740x:*:*:*:*:*:*:*",
"matchCriteriaId": "AEB59CA7-8335-43F6-A410-DF7BD12855FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7800x:*:*:*:*:*:*:*",
"matchCriteriaId": "C39ED459-DE01-4037-A01F-C13BD2E36508",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820eq:*:*:*:*:*:*:*",
"matchCriteriaId": "C5619D4D-9685-4595-8A5F-A18273FE4213",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820hk:*:*:*:*:*:*:*",
"matchCriteriaId": "B77E00E7-0EA4-4E32-A693-0E0F66BA4C57",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820hq:*:*:*:*:*:*:*",
"matchCriteriaId": "DAA3457E-7E1A-4878-9752-79382E954A66",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7820x:*:*:*:*:*:*:*",
"matchCriteriaId": "93396E3B-72F7-4BDA-A872-3E0DE12884C1",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:intel:core_i7:7920hq:*:*:*:*:*:*:*",
"matchCriteriaId": "68630C63-4457-4E12-B7BD-AD456B237FC5",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Privilege escalation vulnerability in Platform Sample/ Silicon Reference firmware for 8th Generation Intel(R) Core Processor, 7th Generation Intel(R) Core Processor may allow privileged user to potentially leverage existing features via local access."
},
{
"lang": "es",
"value": "Vulnerabilidad de escalado de privilegios en el firmware Platform Sample / Silicon Reference para los procesadores de 8\u00aa generaci\u00f3n Intel(R) Core Processor y los procesadores de 7\u00aa generaci\u00f3n Intel(R) Core Processor podr\u00eda permitir que los usuarios privilegiados aprovechen las caracter\u00edsticas existentes mediante acceso local."
}
],
"id": "CVE-2018-12202",
"lastModified": "2024-11-21T03:44:44.630",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-03-14T20:29:00.693",
"references": [
{
"source": "secure@intel.com",
"url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
},
{
"source": "secure@intel.com",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
},
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20190318-0002/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US\u0026docId=emr_na-hpesbhf03912en_us"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CNVD-2020-18567
Vulnerability from cnvd - Published: 2020-03-22
VLAI Severity ?
Title
Intel 8th Generation Intel Core Processor和7th Generation Intel Core Processor权限许可和访问控制问题漏洞
Description
8th Generation Intel Core Processor和7th Generation Intel Core Processor都是美国英特尔(Intel)公司的产品。8th Generation Intel Core Processor是一款第八代Core系列中央处理器(CPU)。7th Generation Intel Core Processor是一款第七代Core系列中央处理器(CPU)。
Intel 8th Generation Intel Core Processor和7th Generation Intel Core Processor存在权限许可和访问控制问题漏洞。攻击者可利用该漏洞提升权限。
Severity
高
Patch Name
Intel 8th Generation Intel Core Processor和7th Generation Intel Core Processor权限许可和访问控制问题漏洞的补丁
Patch Description
8th Generation Intel Core Processor和7th Generation Intel Core Processor都是美国英特尔(Intel)公司的产品。8th Generation Intel Core Processor是一款第八代Core系列中央处理器(CPU)。7th Generation Intel Core Processor是一款第七代Core系列中央处理器(CPU)。
Intel 8th Generation Intel Core Processor和7th Generation Intel Core Processor存在权限许可和访问控制问题漏洞。攻击者可利用该漏洞提升权限。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description
厂商已发布了漏洞修复程序,请及时关注更新: https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html
Reference
https://nvd.nist.gov/vuln/detail/CVE-2018-12202
Impacted products
| Name | ['Intel 8th Generation Intel Core Processor', 'Intel 7th Generation Intel Core Processor'] |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-12202",
"cveUrl": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12202"
}
},
"description": "8th Generation Intel Core Processor\u548c7th Generation Intel Core Processor\u90fd\u662f\u7f8e\u56fd\u82f1\u7279\u5c14\uff08Intel\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u30028th Generation Intel Core Processor\u662f\u4e00\u6b3e\u7b2c\u516b\u4ee3Core\u7cfb\u5217\u4e2d\u592e\u5904\u7406\u5668\uff08CPU\uff09\u30027th Generation Intel Core Processor\u662f\u4e00\u6b3e\u7b2c\u4e03\u4ee3Core\u7cfb\u5217\u4e2d\u592e\u5904\u7406\u5668\uff08CPU\uff09\u3002\n\nIntel 8th Generation Intel Core Processor\u548c7th Generation Intel Core Processor\u5b58\u5728\u6743\u9650\u8bb8\u53ef\u548c\u8bbf\u95ee\u63a7\u5236\u95ee\u9898\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u5347\u6743\u9650\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00191.html",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2020-18567",
"openTime": "2020-03-22",
"patchDescription": "8th Generation Intel Core Processor\u548c7th Generation Intel Core Processor\u90fd\u662f\u7f8e\u56fd\u82f1\u7279\u5c14\uff08Intel\uff09\u516c\u53f8\u7684\u4ea7\u54c1\u30028th Generation Intel Core Processor\u662f\u4e00\u6b3e\u7b2c\u516b\u4ee3Core\u7cfb\u5217\u4e2d\u592e\u5904\u7406\u5668\uff08CPU\uff09\u30027th Generation Intel Core Processor\u662f\u4e00\u6b3e\u7b2c\u4e03\u4ee3Core\u7cfb\u5217\u4e2d\u592e\u5904\u7406\u5668\uff08CPU\uff09\u3002\r\n\r\nIntel 8th Generation Intel Core Processor\u548c7th Generation Intel Core Processor\u5b58\u5728\u6743\u9650\u8bb8\u53ef\u548c\u8bbf\u95ee\u63a7\u5236\u95ee\u9898\u6f0f\u6d1e\u3002\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u63d0\u5347\u6743\u9650\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Intel 8th Generation Intel Core Processor\u548c7th Generation Intel Core Processor\u6743\u9650\u8bb8\u53ef\u548c\u8bbf\u95ee\u63a7\u5236\u95ee\u9898\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Intel 8th Generation Intel Core Processor",
"Intel 7th Generation Intel Core Processor"
]
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-12202",
"serverity": "\u9ad8",
"submitTime": "2019-03-18",
"title": "Intel 8th Generation Intel Core Processor\u548c7th Generation Intel Core Processor\u6743\u9650\u8bb8\u53ef\u548c\u8bbf\u95ee\u63a7\u5236\u95ee\u9898\u6f0f\u6d1e"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…