Vulnerability Details : CVE-2021-33060
Out-of-bounds write in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.
Vulnerability category: Memory Corruption
Products affected by CVE-2021-33060
- cpe:2.3:o:intel:xeon_gold_6342_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6346_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6330_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8360y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6354_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6314u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6338n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_silver_4314_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_silver_4316_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5318y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5317_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6334_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6326_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_silver_4309y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6348_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_silver_4310_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6338t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5318s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6336y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5318n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6312u_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_silver_4310t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5320t_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5320_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5315y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8352m_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8362_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8368_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8358_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8352y_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6338_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6330n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8380_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8351n_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8368q_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8352s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8358p_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8352v_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8360hl_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8360h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8356h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6330h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8380h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5318h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6328h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_5320h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8353h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8354h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6348h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8376h_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8376hl_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_platinum_8380hl_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:intel:xeon_gold_6328hl_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:aff_a700s_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:fas8300_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:fas8700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:aff_a400_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:fas8200_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:aff_c190_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:aff_a200_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:aff_a220_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:aff_a300_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:aff_a700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:aff_a250_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:fas500f_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:aff_a320_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:aff_a800_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:aff_a900_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:fas2600_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:fas2700_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:fas9000_firmware:-:*:*:*:*:*:*:*
- cpe:2.3:o:netapp:fas9500_firmware:-:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-33060
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 11 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-33060
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST |
CWE ids for CVE-2021-33060
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-33060
-
https://security.netapp.com/advisory/ntap-20220930-0004/
CVE-2021-33060 Intel BIOS Firmware Vulnerability in NetApp Products | NetApp Product SecurityThird Party Advisory
-
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00686.html
INTEL-SA-00686Vendor Advisory
Jump to