Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
intel vulnerabilities and exploits
(subscribe to this query)
8.8
CVSSv3
CVE-2022-26341
Insufficiently protected credentials in software in Intel(R) AMT SDK before version 16.0.4.1, Intel(R) EMA before version 1.7.1 and Intel(R) MC before version 2.3.2 may allow an authenticated user to potentially enable escalation of privilege via network access.
Intel Manageability Commander
Intel Active Management Technology Software Development Kit
Intel Endpoint Management Assistant
8.8
CVSSv3
CVE-2022-29893
Improper authentication in firmware for Intel(R) AMT prior to 11.8.93, 11.22.93, 11.12.93, 12.0.92, 14.1.67, 15.0.42, 16.1.25 may allow an authenticated user to potentially enable escalation of privilege via network access.
Intel Active Management Technology Firmware
8.8
CVSSv3
CVE-2022-40250
An attacker can exploit this vulnerability to elevate privileges from ring 0 to ring -2, execute arbitrary code in System Management Mode - an environment more privileged than operating system (OS) and completely isolated from it. Running arbitrary code in SMM additionally bypass...
Intel Nuc M15 Laptop Kit Lapbc510 Firmware Bc0074
Intel Nuc M15 Laptop Kit Lapbc710 Firmware Bc0074
Ami Aptio V 5.0
8.8
CVSSv3
CVE-2022-21139
Inadequate encryption strength for some Intel(R) PROSet/Wireless WiFi products may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Intel Wireless-ac 9560 Firmware
Intel Wireless-ac 9462 Firmware
Intel Wireless-ac 9461 Firmware
Intel Wireless-ac 9260 Firmware
Intel Proset Wi-fi 6e Ax210 Firmware
Intel Wi-fi 6e Ax211 Firmware
Intel Wi-fi 6 Ax200 Firmware
Intel Wi-fi 6 Ax201 Firmware
Intel Wi-fi 6e Ax411 Firmware
8.8
CVSSv3
CVE-2022-23182
Improper access control in the Intel(R) Data Center Manager software before version 4.1 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Intel Data Center Manager
8.8
CVSSv3
CVE-2022-0070
Incomplete fix for CVE-2021-3100. The Apache Log4j hotpatch package starting with log4j-cve-2021-44228-hotpatch-1.1-16 will now explicitly mimic the Linux capabilities and cgroups of the target Java process that the hotpatch is applied to.
Amazon Log4jhotpatch
1 Article
8.8
CVSSv3
CVE-2022-0435
A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly esc...
Linux Linux Kernel 5.17
Linux Linux Kernel
Redhat Enterprise Linux 8.0
Redhat Enterprise Linux Eus 8.2
Redhat Enterprise Linux Server Tus 8.2
Redhat Enterprise Linux Server Aus 8.2
Redhat Enterprise Linux For Real Time 8
Redhat Enterprise Linux Server Tus 8.4
Redhat Enterprise Linux Eus 8.4
Redhat Enterprise Linux For Real Time For Nfv Tus 8.4
Redhat Enterprise Linux For Real Time For Nfv Tus 8.2
Redhat Enterprise Linux For Real Time Tus 8.4
Redhat Enterprise Linux For Real Time Tus 8.2
Redhat Enterprise Linux Server Aus 8.4
Redhat Enterprise Linux For Real Time For Nfv 8
Redhat Enterprise Linux Server Update Services For Sap Solutions 8.2
Redhat Enterprise Linux Server Update Services For Sap Solutions 8.4
Redhat Enterprise Linux For Power Little Endian Eus 8.2
Redhat Enterprise Linux For Ibm Z Systems Eus 8.2
Redhat Enterprise Linux For Power Little Endian 8.0
Redhat Enterprise Linux For Ibm Z Systems Eus 8.4
Redhat Enterprise Linux For Ibm Z Systems 8.0
1 Github repository
8.8
CVSSv3
CVE-2021-33115
Improper input validation for some Intel(R) PROSet/Wireless WiFi in UEFI may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Intel Uefi Wifi Driver
8.8
CVSSv3
CVE-2021-0162
Improper input validation in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Intel Amt Ac 8260 Firmware
Intel Amt Ac 8265 Firmware
Intel Amt Ac 9260 Firmware
Intel Amt Ac 9560 Firmware
Intel Amt Wi-fi 6 Ax200 Firmware
Intel Amt Wi-fi 6 Ax201 Firmware
Intel Amt Wi-fi 6 Ax210 Firmware
Intel Proset Ac 3165 Firmware
Intel Proset Ac 3168 Firmware
Intel Proset Ac 8260 Firmware
Intel Proset Ac 8265 Firmware
Intel Proset Ac 9260 Firmware
Intel Proset Ac 9461 Firmware
Intel Proset Ac 9462 Firmware
Intel Proset Ac 9560 Firmware
Intel Proset Wi-fi 6 Ax200 Firmware
Intel Proset Wi-fi 6 Ax201 Firmware
Intel Proset Wi-fi 6e Ax210 Firmware
Intel Proset Wireless 7265 \\(rev D\\) Firmware
Intel Killer Ac 1550 Firmware
Intel Killer Wi-fi 6 Ax1650 Firmware
Intel Killer Wi-fi 6e Ax1675 Firmware
8.8
CVSSv3
CVE-2021-0163
Improper Validation of Consistency within input in software for Intel(R) PROSet/Wireless Wi-Fi and Killer(TM) Wi-Fi in Windows 10 and 11 may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
Intel Amt Ac 8260 Firmware
Intel Amt Ac 8265 Firmware
Intel Amt Ac 9260 Firmware
Intel Amt Ac 9560 Firmware
Intel Amt Wi-fi 6 Ax200 Firmware
Intel Amt Wi-fi 6 Ax201 Firmware
Intel Amt Wi-fi 6 Ax210 Firmware
Intel Proset Ac 3165 Firmware
Intel Proset Ac 3168 Firmware
Intel Proset Ac 8260 Firmware
Intel Proset Ac 8265 Firmware
Intel Proset Ac 9260 Firmware
Intel Proset Ac 9461 Firmware
Intel Proset Ac 9462 Firmware
Intel Proset Ac 9560 Firmware
Intel Proset Wi-fi 6 Ax200 Firmware
Intel Proset Wi-fi 6 Ax201 Firmware
Intel Proset Wi-fi 6e Ax210 Firmware
Intel Proset Wireless 7265 \\(rev D\\) Firmware
Intel Killer Ac 1550 Firmware
Intel Killer Wi-fi 6 Ax1650 Firmware
Intel Killer Wi-fi 6e Ax1675 Firmware
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2022-48693
CVE-2024-30851
CVE-2024-34460
CVE-2024-2887
local
CVE-2024-27956
remote code execution
CVE-2024-34475
privilege
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
5
6
7
8
9
10
NEXT »