CWE
20
Advisory Published
Updated

CVE-2019-11125: Input Validation

First published: Thu Jun 13 2019(Updated: )

Insufficient input validation in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.

Credit: secure@intel.com

Affected SoftwareAffected VersionHow to fix
Intel Nuc Kit Firmware
Intel Nuc Kit Nuc8i3bex
Intel Nuc Kit Nuc8i3bex=nuc_kit_d34010wyx
Intel Nuc Kit Nuc8i3bex=nuc_kit_d54250wyx
Intel Nuc Kit Nuc8i3bex=nuc_kit_de3815tyb
Intel Nuc Kit Nuc8i3bex=nuc_kit_dn2820fykh
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc5cpyh
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc5i3myx
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc5i3ryx
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc5i5myx
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc5i5ryx
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc5i7ryx
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc5pgyh
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc5ppyh
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc6cayx
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc6i3syx
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc6i5syx
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc6i7kyk
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc7cjy
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc7i3bnx
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc7i3dnx
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc7i5bnx
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc7i5dnx
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc7i7bnx
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc7i7dnx
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc7pjy
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc8i3cyx
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc8i5bex
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc8i7bex
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc8i7hnk
Intel Nuc Kit Nuc8i3bex=nuc_kit_nuc8i7hvk
Intel Compute Card Firmware
Intel Compute Card Cd1c64gk
Intel Compute Card Cd1iv128mk
Intel Compute Card Cd1m3128mk
Intel Compute Card Cd1p64gk
Intel Compute Stick Firmware
Intel Compute Stick Stck1a32wfc
Intel Compute Stick Stck1a8lfc
Intel Compute Stick Stk2m364cc
Intel Compute Stick Stk2m3w64cc
Intel Compute Stick Stk2mv64cc

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the vulnerability ID of this vulnerability?

    The vulnerability ID of this vulnerability is CVE-2019-11125.

  • What is the severity of CVE-2019-11125?

    The severity of CVE-2019-11125 is medium with a severity value of 6.7.

  • What software is affected by CVE-2019-11125?

    The affected software is Intel NUC Kit Firmware.

  • What are the potential impacts of CVE-2019-11125?

    The potential impacts of CVE-2019-11125 include escalated privilege, denial of service, and information disclosure via local access.

  • Where can I find more information about CVE-2019-11125?

    You can find more information about CVE-2019-11125 at the following references: [1] [2] [3]

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203