VARIoT IoT vulnerabilities database

Affected products: vendor, model and version
CWE format is 'CWE-number'. Threat type can be: remote or local
Look up free text in title and description

VAR-202202-0042 CVE-2021-0107 plural  Intel(R) Processor  Unchecked return value vulnerability in firmware CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. plural Intel(R) Processor There is a vulnerability in the firmware regarding unchecked return values.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202202-0099 CVE-2021-0103 plural  Intel(R) Processor  Privilege management vulnerabilities in firmware CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Insufficient control flow management in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access. plural Intel(R) Processor There is a permission management vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
VAR-202202-0094 CVE-2021-0127 plural  Intel(R) Processor  Firmware vulnerability CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access. plural Intel(R) Processor There is an unspecified vulnerability in the firmware.Denial of service (DoS) It may be put into a state. ========================================================================== Ubuntu Security Notice USN-5535-1 July 28, 2022 Intel Microcode vulnerabilities ========================================================================== A security issue affects these releases of Ubuntu and its derivatives: - Ubuntu 16.04 ESM Summary: Several security issues were fixed in Intel Microcode. Software Description: - intel-microcode: Processor microcode for Intel CPUs Details: Joseph Nuzman discovered that some Intel processors did not properly initialise shared resources. A local attacker could use this to obtain sensitive information. (CVE-2021-0145) Mark Ermolov, Dmitry Sklyarov and Maxim Goryachy discovered that some Intel processors did not prevent test and debug logic from being activated at runtime. A local attacker could use this to escalate privileges. A local attacker could use this to cause a denial of service (system crash). (CVE-2021-0127) It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21123, CVE-2022-21127) It was discovered that some Intel processors did not completely perform cleanup actions on microarchitectural fill buffers. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21125) Alysa Milburn, Jason Brandt, Avishai Redelman and Nir Lavi discovered that some Intel processors improperly optimised security-critical code. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21151) It was discovered that some Intel processors did not properly perform cleanup during specific special register write operations. A local attacker could possibly use this to expose sensitive information. (CVE-2022-21166) It was discovered that some Intel processors did not properly restrict access in some situations. A local attacker could use this to obtain sensitive information. (CVE-2021-33117) Brandon Miller discovered that some Intel processors did not properly restrict access in some situations. A local attacker could use this to obtain sensitive information or a remote attacker could use this to cause a denial of service (system crash). (CVE-2021-33120) Update instructions: The problem can be corrected by updating your system to the following package versions: Ubuntu 16.04 ESM: intel-microcode 3.20220510.0ubuntu0.16.04.1+esm1 In general, a standard system update will make all the necessary changes. References: https://ubuntu.com/security/notices/USN-5535-1 CVE-2021-0127, CVE-2021-0145, CVE-2021-0146, CVE-2021-33117, CVE-2021-33120, CVE-2022-21123, CVE-2022-21125, CVE-2022-21127, CVE-2022-21151, CVE-2022-21166 . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202402-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: High Title: intel-microcode: Multiple Vulnerabilities Date: February 19, 2024 Bugs: #832985, #894474 ID: 202402-22 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======== Multiple vulnerabilities have been discovered in intel-microcode, the worst of which can lead to privilege escalation. Background ========== Intel IA32/IA64 microcode update data. Affected packages ================= Package Vulnerable Unaffected ---------------------------- -------------------- --------------------- sys-firmware/intel-microcode < 20230214_p20230212 >= 20230214_p20230212 Description =========== Multiple vulnerabilities have been discovered in NVIDIA Drivers. Please review the CVE identifiers referenced below for details. Impact ====== Please review the referenced CVE identifiers for details. Workaround ========== There is no known workaround at this time. Resolution ========== All intel-microcode users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=sys-firmware/intel-microcode-20230214_p20230212" References ========== [ 1 ] CVE-2021-0127 https://nvd.nist.gov/vuln/detail/CVE-2021-0127 [ 2 ] CVE-2021-0146 https://nvd.nist.gov/vuln/detail/CVE-2021-0146 Availability ============ This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202402-22 Concerns? ========= Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ======= Copyright 2024 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5
VAR-202202-0051 CVE-2021-33068 Intel(R) AMT  In  NULL  Pointer dereference vulnerability CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
Null pointer dereference in subsystem for Intel(R) AMT before versions 15.0.35 may allow an authenticated user to potentially enable denial of service via network access. Intel(R) AMT for, NULL There is a vulnerability in pointer dereference.Service operation interruption (DoS) It may be in a state
VAR-202202-0092 CVE-2021-0099 plural  Intel(R) Processor  Privilege management vulnerabilities in firmware CVSS V2: 4.6
CVSS V3: 7.8
Severity: HIGH
Insufficient control flow management in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable an escalation of privilege via local access. plural Intel(R) Processor There is a permission management vulnerability in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) May be in a state
VAR-202202-1344 CVE-2021-44864 TP-Link WR886N  Classic buffer overflow vulnerability in CVSS V2: 4.0
CVSS V3: 6.5
Severity: MEDIUM
TP-Link WR886N 3.0 1.0.1 Build 150127 Rel.34123n is vulnerable to Buffer Overflow. Authenticated attackers can crash router httpd services via /userRpm/PingIframeRpm.htm request which contains redundant & in parameter. TP-Link WR886N Exists in a classic buffer overflow vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202202-1349 CVE-2022-21971 plural  Microsoft Windows  Remote Code Execution Vulnerability in Product CVSS V2: 9.3
CVSS V3: 7.8
Severity: HIGH
Windows Runtime Remote Code Execution Vulnerability. Microsoft Windows Runtime(.net framework)是美国微软(Microsoft)公司的一款Windows操作系统中必要的功能支持库. Microsoft Windows Runtime 存在代码注入漏洞。以下产品和版本受到影响:Windows 10 Version 21H2 for x64-based Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 11 for ARM64-based Systems,Windows 11 for x64-based Systems,Windows Server, version 20H2 (Server Core Installation),Windows 10 Version 20H2 for ARM64-based Systems,Windows 10 Version 20H2 for 32-bit Systems,Windows 10 Version 20H2 for x64-based Systems,Windows Server 2022 (Server Core installation),Windows Server 2022,Windows 10 Version 21H1 for 32-bit Systems,Windows 10 Version 21H1 for ARM64-based Systems,Windows 10 Version 21H1 for x64-based Systems,Windows 10 Version 1909 for ARM64-based Systems,Windows 10 Version 1909 for x64-based Systems,Windows 10 Version 1909 for 32-bit Systems,Windows Server 2019 (Server Core installation),Windows Server 2019,Windows 10 Version 1809 for ARM64-based Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for 32-bit Systems
VAR-202202-0304 CVE-2022-22718 plural  Microsoft Windows  Elevated authority vulnerabilities in products CVSS V2: 7.2
CVSS V3: 7.8
Severity: HIGH
Windows Print Spooler Elevation of Privilege Vulnerability. This vulnerability is CVE-2022-21997 , CVE-2022-21999 , CVE-2022-22717 Is a different vulnerability.You may be elevated. Microsoft Windows Print Spooler Components存在权限许可和访问控制问题漏洞。以下产品和版本受到影响:Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Server 2019,Windows Server 2019 (Server Core installation),Windows 10 Version 21H1 for ARM64-based Systems,Windows 10 Version 21H1 for 32-bit Systems,Windows Server 2022,Windows Server 2022 (Server Core installation),Windows Server 2022 Azure Edition Core Hotpatch,Windows 10 Version 20H2 for x64-based Systems,Windows 10 Version 20H2 for 32-bit Systems,Windows 10 Version 20H2 for ARM64-based Systems,Windows Server, version 20H2 (Server Core Installation),Windows 11 for x64-based Systems,Windows 11 for ARM64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2012 R2 (Server Core installation),Windows 10 Version 1909 for 32-bit Systems,Windows 10 Version 1909 for x64-based Systems,Windows 10 Version 1909 for ARM64-based Systems,Windows 10 Version 21H1 for x64-based Systems,Windows 10 Version 21H2 for x64-based Systems,Windows 10 for 32-bit Systems,Windows 10 for x64-based Systems,Windows 7 for x64-based Systems Service Pack 1,Windows 8.1 for 32-bit systems,Windows 8.1 for x64-based systems,Windows RT 8.1,Windows Server 2008 for 32-bit Systems Service Pack 2,Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows 10 Version 1607 for 32-bit Systems,Windows 10 Version 1607 for x64-based Systems,Windows Server 2016,Windows Server 2016 (Server Core installation),Windows 7 for 32-bit Systems Service Pack 1,Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation)
VAR-202202-0303 CVE-2022-21999 plural  Microsoft Windows  Elevated authority vulnerabilities in products CVSS V2: 4.6
CVSS V3: 7.8
Severity: MEDIUM
Windows Print Spooler Elevation of Privilege Vulnerability. This vulnerability is CVE-2022-21997 , CVE-2022-22717 , CVE-2022-22718 Is a different vulnerability.You may be elevated. Microsoft Windows Print Spooler Components存在权限许可和访问控制问题漏洞。以下产品和版本受到影响:Windows Server 2008 for 32-bit Systems Service Pack 2 (Server Core installation),Windows Server 2008 for x64-based Systems Service Pack 2,Windows Server 2008 for x64-based Systems Service Pack 2 (Server Core installation),Windows Server 2008 R2 for x64-based Systems Service Pack 1,Windows Server 2008 R2 for x64-based Systems Service Pack 1 (Server Core installation),Windows Server 2012,Windows Server 2012 (Server Core installation),Windows Server 2012 R2,Windows Server 2012 R2 (Server Core installation),Windows 10 Version 1607 for 32-bit Systems,Windows 10 Version 1607 for x64-based Systems,Windows Server 2016,Windows Server 2016 (Server Core installation),Windows 7 for 32-bit Systems Service Pack 1,Windows 7 for x64-based Systems Service Pack 1,Windows 8.1 for 32-bit systems,Windows 8.1 for x64-based systems,Windows RT 8.1,Windows Server 2008 for 32-bit Systems Service Pack 2,Windows 10 Version 1809 for 32-bit Systems,Windows 10 Version 1809 for x64-based Systems,Windows 10 Version 1809 for ARM64-based Systems,Windows Server 2019,Windows Server 2019 (Server Core installation),Windows 10 Version 1909 for 32-bit Systems,Windows 10 Version 1909 for x64-based Systems,Windows 10 Version 1909 for ARM64-based Systems,Windows 10 Version 21H1 for x64-based Systems,Windows 10 Version 21H1 for ARM64-based Systems,Windows 10 Version 21H1 for 32-bit Systems,Windows Server 2022,Windows Server 2022 (Server Core installation),Windows Server 2022 Azure Edition Core Hotpatch,Windows 10 Version 20H2 for x64-based Systems,Windows 10 Version 20H2 for 32-bit Systems,Windows 10 Version 20H2 for ARM64-based Systems,Windows Server, version 20H2 (Server Core Installation),Windows 11 for x64-based Systems,Windows 11 for ARM64-based Systems,Windows 10 Version 21H2 for 32-bit Systems,Windows 10 Version 21H2 for ARM64-based Systems,Windows 10 Version 21H2 for x64-based Systems,Windows 10 for 32-bit Systems,Windows 10 for x64-based Systems
VAR-202202-1347 CVE-2021-33110 plural  Intel(R) Wireless Bluetooth(R)  products and  Killer(TM) Bluetooth(R)  Product input verification vulnerabilities CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
Improper input validation for some Intel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) products in Windows 10 and 11 before version 22.80 may allow an unauthenticated user to potentially enable denial of service via adjacent access. plural Intel(R) Wireless Bluetooth(R) products and Killer(TM) Bluetooth(R) The product contains an input validation vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202202-0525 CVE-2021-33115 Intel(R) PROSet/Wireless WiFi  of  UEFI  Input verification vulnerability in CVSS V2: 5.8
CVSS V3: 8.8
Severity: HIGH
Improper input validation for some Intel(R) PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. Intel(R) PROSet/Wireless WiFi of UEFI There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202202-0519 CVE-2021-0166 plural  Intel(R) PROSet/Wireless Wi-Fi  and  Killer(TM) Wi-Fi  Information disclosure vulnerability in firmware for CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access. plural Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi firmware contains an information disclosure vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202202-0518 CVE-2021-0161 Intel(R) PROSet/Wireless Wi-Fi  and  Killer(TM) Wi-Fi  input validation vulnerability in firmware for CVSS V2: 4.6
CVSS V3: 6.7
Severity: MEDIUM
Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi firmware contains an input validation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202202-0517 CVE-2021-0170 plural  Intel(R) PROSet/Wireless Wi-Fi  and  Killer(TM) Wi-Fi  Information disclosure vulnerability in firmware for CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Exposure of Sensitive Information to an Unauthorized Actor in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an authenticated user to potentially enable information disclosure via local access. plural Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi firmware contains an information disclosure vulnerability.Information may be obtained
VAR-202202-0516 CVE-2021-0175 plural  Intel(R) PROSet/Wireless Wi-Fi  products and  Killer(TM) Wi-Fi  Product input verification vulnerabilities CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access. plural Intel(R) PROSet/Wireless Wi-Fi products and Killer(TM) Wi-Fi The product contains an input validation vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202202-0514 CVE-2021-0163 Intel(R) PROSet/Wireless Wi-Fi  and  Killer(TM) Wi-Fi  Vulnerability related to input validation in software for CVSS V2: 5.8
CVSS V3: 8.8
Severity: HIGH
Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access. (DoS) It may be in a state
VAR-202202-0513 CVE-2021-0066 Intel(R) PROSet/Wireless Wi-Fi  and  Killer(TM) Wi-Fi  input validation vulnerability in firmware for CVSS V2: 4.6
CVSS V3: 8.4
Severity: HIGH
Improper input validation in firmware for Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via local access. Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi firmware contains an input validation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state
VAR-202202-0512 CVE-2021-33155 plural  Intel(R) Wireless Bluetooth(R)  and  Killer(TM) Bluetooth(R)  product   Input verification vulnerability in CVSS V2: 2.7
CVSS V3: 5.7
Severity: MEDIUM
Improper input validation in firmware for some Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) products before version 22.100 may allow an authenticated user to potentially enable denial of service via adjacent access. plural Intel(R) Wireless Bluetooth(R) and Killer(TM) Bluetooth(R) product There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state
VAR-202202-0510 CVE-2021-0076 Intel(R) PROSet/Wireless Wi-Fi  and  Killer(TM) Wi-Fi  input validation vulnerability in firmware for CVSS V2: 2.1
CVSS V3: 5.5
Severity: MEDIUM
Improper Validation of Specified Index, Position, or Offset in Input in firmware for some Intel(R) PROSet/Wireless Wi-Fi in multiple operating systems and some Killer(TM) Wi-Fi in Windows 10 and 11 may allow a privileged user to potentially enable denial of service via local access. Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi firmware contains an input validation vulnerability.Service operation interruption (DoS) It may be in a state
VAR-202202-0509 CVE-2021-0177 plural  Intel(R) PROSet/Wireless Wi-Fi  products and  Killer(TM) Wi-Fi  Product input verification vulnerabilities CVSS V2: 3.3
CVSS V3: 6.5
Severity: MEDIUM
Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable denial of service via adjacent access. plural Intel(R) PROSet/Wireless Wi-Fi products and Killer(TM) Wi-Fi The product contains an input validation vulnerability.Service operation interruption (DoS) It may be in a state