First published: Mon Aug 19 2019(Updated: )
Insufficient session validation in system firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Nuc Kit Firmware | ||
Intel Nuc Kit Nuc7i3dnx | ||
Intel Nuc Kit Nuc7i5dnx | ||
Intel Nuc Kit Nuc7i7dnx | ||
Intel Compute Stick Firmware | ||
Intel Compute Stick Stk2mv64cc | ||
Intel Compute Card Firmware | ||
Intel Compute Card Cd1iv128mk |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2019-11140.
The severity of CVE-2019-11140 is medium.
An attacker can potentially enable escalation of privilege, denial of service, and/or information disclosure via local access.
The Intel NUC Kit Firmware and Intel Compute Stick Firmware are affected by this vulnerability.
No, the Intel NUC Kit Nuc7i3dnx is not vulnerable to CVE-2019-11140.