Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
intel converged security management engine firmware vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2019-11110
Authentication bypass in the subsystem for Intel(R) CSME prior to 11.8.70, 11.11.70, 11.22.70, 12.0.45, 13.0.10 and 14.0.10; Intel(R) TXE prior to 3.1.70 and 4.0.20 may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Converged Security Management Engine Firmware
Intel Trusted Execution Engine Firmware
2.1
CVSSv2
CVE-2018-12188
Insufficient input validation in Intel CSME prior to 11.8.60, 11.11.60, 11.22.60 or 12.0.20 or Intel TXE before version 3.1.60 or 4.0.10 may allow an unauthenticated user to potentially modify data via physical access.
Intel Converged Security Management Engine Firmware
Intel Trusted Execution Engine Firmware
4.6
CVSSv2
CVE-2018-12190
Insufficient input validation in Intel(r) CSME subsystem prior to 11.8.60, 11.11.60, 11.22.60 or 12.0.20 or Intel(r) TXE prior to 3.1.60 or 4.0.10 may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Trusted Execution Engine Firmware
Intel Converged Security Management Engine Firmware
7.2
CVSSv2
CVE-2018-12199
Buffer overflow in an OS component in Intel CSME prior to 11.8.60, 11.11.60, 11.22.60 or 12.0.20 and Intel TXE version prior to 3.1.60 or 4.0.10 may allow a privileged user to potentially execute arbitrary code via physical access.
Intel Trusted Execution Engine Firmware
Intel Converged Security Management Engine Firmware
2.1
CVSSv2
CVE-2019-0168
Insufficient input validation in the subsystem for Intel(R) CSME prior to 11.8.70, 12.0.45 and 13.0.10; Intel(R) TXE prior to 3.1.70 and 4.0.20 may allow a privileged user to potentially enable information disclosure via local access.
Intel Converged Security Management Engine Firmware
Intel Trusted Execution Engine Firmware
2.1
CVSSv2
CVE-2020-0539
Path traversal in subsystem for Intel(R) DAL software for Intel(R) CSME versions prior to 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32, 14.0.33 and Intel(R) TXE versions prior to 3.1.75, 4.0.25 may allow an unprivileged user to potentially enable denial of service via local acce...
Intel Converged Security Management Engine Firmware
Intel Trusted Execution Engine Firmware
5.8
CVSSv2
CVE-2019-0169
Heap overflow in subsystem in Intel(R) CSME prior to 11.8.70, 11.11.70, 11.22.70, 12.0.45; Intel(R) TXE prior to 3.1.70 and 4.0.20 may allow an unauthenticated user to potentially enable escalation of privileges, information disclosure or denial of service via adjacent access.
Intel Converged Security Management Engine Firmware
Intel Trusted Execution Engine Firmware
4.6
CVSSv2
CVE-2019-11106
Insufficient session validation in the subsystem for Intel(R) CSME prior to 11.8.70, 12.0.45, 13.0.10 and 14.0.10; Intel(R) TXE prior to 3.1.70 and 4.0.20 may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Converged Security Management Engine Firmware
Intel Trusted Execution Engine Firmware
5
CVSSv2
CVE-2020-0536
Improper input validation in the DAL subsystem for Intel(R) CSME versions prior to 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32,14.0.33 and Intel(R) TXE versions prior to 3.1.75 and 4.0.25 may allow an unauthenticated user to potentially enable information disclosure via network...
Intel Converged Security Management Engine Firmware
Intel Trusted Execution Engine Firmware
4.6
CVSSv2
CVE-2019-11103
Insufficient input validation in firmware update software for Intel(R) CSME prior to 12.0.45,13.0.10 and 14.0.10 may allow an authenticated user to potentially enable escalation of privilege via local access.
Intel Converged Security Management Engine Firmware
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4651
CVE-2024-34255
elevation of privilege
CVE-2024-25529
CVE-2024-4671
NULL pointer dereference
CVE-2024-25527
template injection
CVE-2008-0166
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
7
NEXT »