First published: Mon Oct 05 2020(Updated: )
Insufficient control flow management in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 & 5000 Series Processors may allow an authenticated user to potentially enable denial of service via adjacent access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/edk2 | 2020.11-2+deb11u2 2022.11-6+deb12u1 2024.05-2 | |
All of | ||
Intel BIOS firmware | ||
Any of | ||
Intel Celeron 4205U | ||
Intel Celeron 4305U Firmware | ||
Intel Celeron 4305UE Firmware | ||
Intel Celeron G5205U | ||
Intel Celeron G5305U | ||
Intel Core i3-8100 | ||
Intel Core i3-8100F | ||
Intel Core i3-8100T | ||
Intel Core i3-8300 | ||
Intel Core i3-8300T | ||
Intel Core i3-8350K | ||
Intel Core i3-9100 | ||
Intel Core i3-9100F | ||
Intel Core i3-9100T | ||
Intel Core i3-9300 | ||
Intel Core i3-9300T | ||
Intel Core i3-9320 | ||
Intel Core i3-9350K | ||
Intel Core i3-9350KF | ||
Intel Core i5-8400 | ||
Intel Core i5-8400T | ||
Intel Core i5-8500 | ||
Intel Core i5-8500T | ||
Intel Core i5-8600 | ||
Intel Core i5-8600K | ||
Intel Core i5-8600T | ||
Intel Core i5-9400 | ||
Intel Core i5-9400F | ||
Intel Core i5-9400T | ||
Intel Core i5-9500 | ||
Intel Core i5-9500F | ||
Intel Core i5-9500T | ||
Intel Core i5-9600 | ||
Intel Core i5-9600K | ||
Intel Core i5-9600KF | ||
Intel Core i5-9600T | ||
Intel Core i7-1060G7 | ||
Intel Core i7-1060G7 | ||
Intel Core i7-1065G7 | ||
Intel Core i7-1068NG7 | ||
Intel Core i7-8086K | ||
Intel Core i7-8700 | ||
Intel Core i7-8700K | ||
Intel Core i7-8700T | ||
Intel Core i7-9700F | ||
Intel Core i7-9700F | ||
Intel Core i7-9700K | ||
Intel Core i7-9700KF | ||
Intel Core i7-9700T Firmware | ||
Intel Core i9-9900 | ||
Intel Core i9-9900KF | ||
Intel Core i9-9900KF | ||
Intel Core i9-9900KS | ||
Intel Core i9-9900T | ||
Debian | =9.0 | |
Intel BIOS firmware | ||
Intel Celeron 4205U | ||
Intel Celeron 4305U Firmware | ||
Intel Celeron 4305UE Firmware | ||
Intel Celeron G5205U | ||
Intel Celeron G5305U | ||
Intel Core i3-8100 | ||
Intel Core i3-8100F | ||
Intel Core i3-8100T | ||
Intel Core i3-8300 | ||
Intel Core i3-8300T | ||
Intel Core i3-8350K | ||
Intel Core i3-9100 | ||
Intel Core i3-9100F | ||
Intel Core i3-9100T | ||
Intel Core i3-9300 | ||
Intel Core i3-9300T | ||
Intel Core i3-9320 | ||
Intel Core i3-9350K | ||
Intel Core i3-9350KF | ||
Intel Core i5-8400 | ||
Intel Core i5-8400T | ||
Intel Core i5-8500 | ||
Intel Core i5-8500T | ||
Intel Core i5-8600 | ||
Intel Core i5-8600K | ||
Intel Core i5-8600T | ||
Intel Core i5-9400 | ||
Intel Core i5-9400F | ||
Intel Core i5-9400T | ||
Intel Core i5-9500 | ||
Intel Core i5-9500F | ||
Intel Core i5-9500T | ||
Intel Core i5-9600 | ||
Intel Core i5-9600K | ||
Intel Core i5-9600KF | ||
Intel Core i5-9600T | ||
Intel Core i7-1060G7 | ||
Intel Core i7-1060G7 | ||
Intel Core i7-1065G7 | ||
Intel Core i7-1068NG7 | ||
Intel Core i7-8086K | ||
Intel Core i7-8700 | ||
Intel Core i7-8700K | ||
Intel Core i7-8700T | ||
Intel Core i7-9700F | ||
Intel Core i7-9700F | ||
Intel Core i7-9700K | ||
Intel Core i7-9700KF | ||
Intel Core i7-9700T Firmware | ||
Intel Core i9-9900 | ||
Intel Core i9-9900KF | ||
Intel Core i9-9900KF | ||
Intel Core i9-9900KS | ||
Intel Core i9-9900T |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-14558 is a vulnerability in BIOS firmware for 8th, 9th, and 10th Generation Intel(R) Core(TM) processors that could potentially enable denial of service.
CVE-2019-14558 has a severity rating of 5.7, which is considered medium severity.
An authenticated user can exploit CVE-2019-14558 by gaining adjacent access and potentially enabling denial of service.
The affected software versions include Ubuntu edk2 0~20180205., Ubuntu edk2 0~20190606.20, Ubuntu edk2 0~20200229.4, Ubuntu edk2 0~20160408., Debian edk2 0~20181115.85588389-3+deb10u3, Debian edk2 2020.11-2+deb11u1, Debian edk2 2022.11-6, Debian edk2 2023.05-2, and Intel BIOS.
To fix CVE-2019-14558, you should apply the recommended patches provided by your operating system, such as the patches from Ubuntu or Debian.