5.8
CVSSv2

CVE-2019-0173

Published: 19/08/2019 Updated: 24/08/2020
CVSS v2 Base Score: 5.8 | Impact Score: 4.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 7.6 | Impact Score: 4.7 | Exploitability Score: 2.8
VMScore: 516
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Vulnerability Summary

Authentication bypass in the web console for Intel(R) Raid Web Console 2 all versions may allow an unauthenticated malicious user to potentially enable disclosure of information via network access.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

intel raid web console 2

Recent Articles

Intel: Listen up, you NUC-leheads! Mini PCs and compute sticks just got a major security fix
The Register • Shaun Nichols in San Francisco • 14 Aug 2019

Chipzilla patches firmware, drivers, SDKs This summer's hottest sequels: BlueKeep II, III, IV and V – the latest wormable RDP holes in Microsoft Windows

Hot on the heels of Patch Tuesday fixes from Microsoft, Apple, Adobe, and SAP, Intel has dropped its monthly security bundle to address a series of seven CVE-listed vulnerabilities in its firmware and software. The most serious of the seven is the patch for CVE-2019-11162, a vulnerability in the Intel Compute Improvement Program software. This program is an opt-in diagnostic tool that collects detailed information about the hardware it's running on and less-detailed information about activities ...