VARIoT IoT vulnerabilities database
| VAR-202202-0042 | CVE-2021-0107 | plural Intel(R) Processor Unchecked return value vulnerability in firmware |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. plural Intel(R) Processor There is a vulnerability in the firmware regarding unchecked return values.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202202-0099 | CVE-2021-0103 | plural Intel(R) Processor Privilege management vulnerabilities in firmware |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Insufficient control flow management in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access. plural Intel(R) Processor There is a permission management vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202202-0094 | CVE-2021-0127 | plural Intel(R) Processor Firmware vulnerability |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access. plural Intel(R) Processor There is an unspecified vulnerability in the firmware.Denial of service (DoS) It may be put into a state. ==========================================================================
Ubuntu Security Notice USN-5535-1
July 28, 2022
Intel Microcode vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM
Summary:
Several security issues were fixed in Intel Microcode.
Software Description:
- intel-microcode: Processor microcode for Intel CPUs
Details:
Joseph Nuzman discovered that some Intel processors did not properly
initialise shared resources. A local attacker could use this to obtain
sensitive information. (CVE-2021-0145)
Mark Ermolov, Dmitry Sklyarov and Maxim Goryachy discovered that some Intel
processors did not prevent test and debug logic from being activated at
runtime. A local attacker could use this to escalate
privileges. A local attacker could use this to cause a denial
of service (system crash). (CVE-2021-0127)
It was discovered that some Intel processors did not completely perform
cleanup actions on multi-core shared buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21123,
CVE-2022-21127)
It was discovered that some Intel processors did not completely perform
cleanup actions on microarchitectural fill buffers. A local attacker could
possibly use this to expose sensitive information. (CVE-2022-21125)
Alysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi discovered that
some Intel processors improperly optimised security-critical code. A local
attacker could possibly use this to expose sensitive
information. (CVE-2022-21151)
It was discovered that some Intel processors did not properly perform
cleanup during specific special register write operations. A local attacker
could possibly use this to expose sensitive information. (CVE-2022-21166)
It was discovered that some Intel processors did not properly restrict
access in some situations. A local attacker could use this to obtain
sensitive information. (CVE-2021-33117)
Brandon Miller discovered that some Intel processors did not properly
restrict access in some situations. A local attacker could use this to
obtain sensitive information or a remote attacker could use this to
cause a denial of service (system crash). (CVE-2021-33120)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 ESM:
intel-microcode 3.20220510.0ubuntu0.16.04.1+esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-5535-1
CVE-2021-0127, CVE-2021-0145, CVE-2021-0146, CVE-2021-33117,
CVE-2021-33120, CVE-2022-21123, CVE-2022-21125, CVE-2022-21127,
CVE-2022-21151, CVE-2022-21166
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202402-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: intel-microcode: Multiple Vulnerabilities
Date: February 19, 2024
Bugs: #832985, #894474
ID: 202402-22
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been discovered in intel-microcode, the
worst of which can lead to privilege escalation.
Background
==========
Intel IA32/IA64 microcode update data.
Affected packages
=================
Package Vulnerable Unaffected
---------------------------- -------------------- ---------------------
sys-firmware/intel-microcode < 20230214_p20230212 >= 20230214_p20230212
Description
===========
Multiple vulnerabilities have been discovered in NVIDIA Drivers. Please
review the CVE identifiers referenced below for details.
Impact
======
Please review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All intel-microcode users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=sys-firmware/intel-microcode-20230214_p20230212"
References
==========
[ 1 ] CVE-2021-0127
https://nvd.nist.gov/vuln/detail/CVE-2021-0127
[ 2 ] CVE-2021-0146
https://nvd.nist.gov/vuln/detail/CVE-2021-0146
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202402-22
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2024 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
| VAR-202202-0051 | CVE-2021-33068 | Intel(R) AMT In NULL Pointer dereference vulnerability |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access. Intel(R) AMT for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state
| VAR-202202-0092 | CVE-2021-0099 | plural Intel(R) Processor Privilege management vulnerabilities in firmware |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: HIGH |
Insufficient control flow management in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable an escalation of privilege via local access. plural Intel(R) Processor There is a permission management vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) May be in a state
| VAR-202202-1344 | CVE-2021-44864 | TP-Link WR886N Classic buffer overflow vulnerability in |
CVSS V2: 4.0 CVSS V3: 6.5 Severity: MEDIUM |
TP-Link WR886N 3.0 1.0.1 Build 150127 Rel.34123n is vulnerable to Buffer Overflow. Authenticated attackers can crash router httpd services via /userRpm/PingIframeRpm.htm request which contains redundant & in parameter. TP-Link WR886N Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202202-1349 | CVE-2022-21971 | plural Microsoft Windows Remote Code Execution Vulnerability in Product |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
Windows Runtime Remote Code Execution Vulnerability. Microsoft Windows Runtime(.net framework)是美国微软(Microsoft)公司的一款Windows操作系统中必要的功能支持库.
Microsoft Windows Runtime 存在代码注入漏洞。以下产品和版本受到影响:Windows 10 Version 21H2 for x64-based Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 11 for ARM64-based Systems,Windows 11 for x64-based Systems,Windows Server, version 20H2 (Server Core Installation),Windows 10 Version 20H2 for ARM64-based Systems,Windows 10 Version 20H2 for 32-bit Systems,Windows 10 Version 20H2 for x64-based Systems,Windows Server 2022 (Server Core installation),Windows Server 2022,Windows 10 Version 21H1 for 32-bit Systems,Windows 10 Version 21H1 for ARM64-based Systems,Windows 10 Version 21H1 for x64-based Systems,Windows 10 Version 1909 for ARM64-based Systems,Windows 10 Version 1909 for x64-based Systems,Windows 10 Version 1909 for 32-bit Systems,Windows Server 2019 (Server Core installation),Windows Server 2019,Windows 10 Version 1809 for ARM64-based Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for 32-bit Systems
| VAR-202202-0304 | CVE-2022-22718 | plural Microsoft Windows Elevated authority vulnerabilities in products |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
Windows Print Spooler Elevation of Privilege Vulnerability. This vulnerability is CVE-2022-21997 , CVE-2022-21999 , CVE-2022-22717 Is a different vulnerability.You may be elevated.
Microsoft Windows Print Spooler Components存在权限许可和访问控制问题漏洞。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Server 2019,Windows Server 2019 (Server Core installation),Windows 10 Version 21H1 for ARM64-based Systems,Windows 10 Version 21H1 for 32-bit Systems,Windows Server 2022,Windows Server 2022 (Server Core installation),Windows Server 2022 Azure Edition Core Hotpatch,Windows 10 Version 20H2 for x64-based Systems,Windows 10 Version 20H2 for 32-bit Systems,Windows 10 Version 20H2 for ARM64-based Systems,Windows Server, version 20H2 (Server Core Installation),Windows 11 for x64-based Systems,Windows 11 for ARM64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2012 R2 (Server Core installation),Windows 10 Version 1909 for 32-bit Systems,Windows 10 Version 1909 for x64-based Systems,Windows 10 Version 1909 for ARM64-based Systems,Windows 10 Version 21H1 for x64-based Systems,Windows 10 Version 21H2 for x64-based Systems,Windows 10 for 32-bit Systems,Windows 10 for x64-based Systems,Windows 7 for x64-based Systems Service Pack 1,Windows 8.1 for 32-bit systems,Windows 8.1 for x64-based systems,Windows RT 8.1,Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows 10 Version 1607 for 32-bit Systems,Windows 10 Version 1607 for x64-based Systems,Windows Server 2016,Windows Server 2016 (Server Core installation),Windows 7 for 32-bit Systems Service Pack 1,Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
| VAR-202202-0303 | CVE-2022-21999 | plural Microsoft Windows Elevated authority vulnerabilities in products |
CVSS V2: 4.6 CVSS V3: 7.8 Severity: MEDIUM |
Windows Print Spooler Elevation of Privilege Vulnerability. This vulnerability is CVE-2022-21997 , CVE-2022-22717 , CVE-2022-22718 Is a different vulnerability.You may be elevated.
Microsoft Windows Print Spooler Components存在权限许可和访问控制问题漏洞。以下产品和版本受到影响:Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2012 R2 (Server Core installation),Windows 10 Version 1607 for 32-bit Systems,Windows 10 Version 1607 for x64-based Systems,Windows Server 2016,Windows Server 2016 (Server Core installation),Windows 7 for 32-bit Systems Service Pack 1,Windows 7 for x64-based Systems Service Pack 1,Windows 8.1 for 32-bit systems,Windows 8.1 for x64-based systems,Windows RT 8.1,Windows Server 2008 for 32-bit Systems Service Pack 2,Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Server 2019,Windows Server 2019 (Server Core installation),Windows 10 Version 1909 for 32-bit Systems,Windows 10 Version 1909 for x64-based Systems,Windows 10 Version 1909 for ARM64-based Systems,Windows 10 Version 21H1 for x64-based Systems,Windows 10 Version 21H1 for ARM64-based Systems,Windows 10 Version 21H1 for 32-bit Systems,Windows Server 2022,Windows Server 2022 (Server Core installation),Windows Server 2022 Azure Edition Core Hotpatch,Windows 10 Version 20H2 for x64-based Systems,Windows 10 Version 20H2 for 32-bit Systems,Windows 10 Version 20H2 for ARM64-based Systems,Windows Server, version 20H2 (Server Core Installation),Windows 11 for x64-based Systems,Windows 11 for ARM64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows 10 Version 21H2 for x64-based Systems,Windows 10 for 32-bit Systems,Windows 10 for x64-based Systems
| VAR-202202-1347 | CVE-2021-33110 | plural Intel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) Product input verification vulnerabilities |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
Improper input validation for some Intel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) products in Windows 10 and 11 before version 22.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access. plural Intel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) The product contains an input validation vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202202-0525 | CVE-2021-33115 | Intel(R) PROSet/Wireless WiFi of UEFI Input verification vulnerability in |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
Improper input validation for some Intel(R) PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. Intel(R) PROSet/Wireless WiFi of UEFI There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202202-0519 | CVE-2021-0166 | plural Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi Information disclosure vulnerability in firmware for |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access. plural Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi firmware contains an information disclosure vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202202-0518 | CVE-2021-0161 | Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi input validation vulnerability in firmware for |
CVSS V2: 4.6 CVSS V3: 6.7 Severity: MEDIUM |
Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi firmware contains an input validation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202202-0517 | CVE-2021-0170 | plural Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi Information disclosure vulnerability in firmware for |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access. plural Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi firmware contains an information disclosure vulnerability.Information may be obtained
| VAR-202202-0516 | CVE-2021-0175 | plural Intel(R) PROSet/Wireless Wi-Fi products and Killer(TM) Wi-Fi Product input verification vulnerabilities |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access. plural Intel(R) PROSet/Wireless Wi-Fi products and Killer(TM) Wi-Fi The product contains an input validation vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202202-0514 | CVE-2021-0163 | Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi Vulnerability related to input validation in software for |
CVSS V2: 5.8 CVSS V3: 8.8 Severity: HIGH |
Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. (DoS) It may be in a state
| VAR-202202-0513 | CVE-2021-0066 | Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi input validation vulnerability in firmware for |
CVSS V2: 4.6 CVSS V3: 8.4 Severity: HIGH |
Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access. Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi firmware contains an input validation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
| VAR-202202-0512 | CVE-2021-33155 | plural Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) product Input verification vulnerability in |
CVSS V2: 2.7 CVSS V3: 5.7 Severity: MEDIUM |
Improper input validation in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access. plural Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) product There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state
| VAR-202202-0510 | CVE-2021-0076 | Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi input validation vulnerability in firmware for |
CVSS V2: 2.1 CVSS V3: 5.5 Severity: MEDIUM |
Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access. Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi firmware contains an input validation vulnerability.Service operation interruption (DoS) It may be in a state
| VAR-202202-0509 | CVE-2021-0177 | plural Intel(R) PROSet/Wireless Wi-Fi products and Killer(TM) Wi-Fi Product input verification vulnerabilities |
CVSS V2: 3.3 CVSS V3: 6.5 Severity: MEDIUM |
Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access. plural Intel(R) PROSet/Wireless Wi-Fi products and Killer(TM) Wi-Fi The product contains an input validation vulnerability.Service operation interruption (DoS) It may be in a state