Insufficient path checking in Intel(R) System Support Utility for Windows before 2.5.0.15 may allow an authenticated user to potentially enable an escalation of privilege via local access.
Max CVSS
7.8
EPSS Score
0.04%
Published
2019-01-10
Updated
2020-08-24
Improper file verification in install routine for Intel(R) SGX SDK and Platform Software for Windows before 2.2.100 may allow an escalation of privilege via local access.
Max CVSS
7.3
EPSS Score
0.04%
Published
2019-01-10
Updated
2019-10-03
Improper directory permissions in the ZeroConfig service in Intel(R) PROSet/Wireless WiFi Software before version 20.90.0.7 may allow an authorized user to potentially enable escalation of privilege via local access.
Max CVSS
7.8
EPSS Score
0.04%
Published
2019-01-10
Updated
2019-10-03
Firmware update routine in bootloader for Intel(R) Optane(TM) SSD DC P4800X before version E2010435 may allow a privileged user to potentially enable a denial of service via local access.
Max CVSS
4.4
EPSS Score
0.04%
Published
2019-01-10
Updated
2019-02-01
Insufficient write protection in firmware for Intel(R) Optane(TM) SSD DC P4800X before version E2010435 may allow a privileged user to potentially enable a denial of service via local access.
Max CVSS
4.4
EPSS Score
0.04%
Published
2019-01-10
Updated
2019-02-01
Improper directory permissions in the installer for the Intel(R) SSD Data Center Tool for Windows before v3.0.17 may allow authenticated users to potentially enable an escalation of privilege via local access.
Max CVSS
7.8
EPSS Score
0.04%
Published
2019-01-10
Updated
2019-10-03
Improper setting of device configuration in system firmware for Intel(R) NUC kits may allow a privileged user to potentially enable escalation of privilege via physical access.
Max CVSS
6.2
EPSS Score
0.04%
Published
2019-01-10
Updated
2019-10-03
7 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!