Latest intel core i5-8269u Vulnerabilities

Improper input validation in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via adjacent access.
Intel Atom X6200fe Firmware
Intel Atom X6200fe
Intel Atom X6211e Firmware
Intel Atom X6211e
Intel Atom X6212re Firmware
Intel Atom X6212re
and 1252 more
Out-of-bounds read in the BIOS firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via adjacent access.
Intel Atom X6200fe Firmware
Intel Atom X6200fe
Intel Atom X6211e Firmware
Intel Atom X6211e
Intel Atom X6212re Firmware
Intel Atom X6212re
and 1252 more
Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access.
Intel Pentium J6426 Firmware
Intel Pentium J6426
Intel Pentium J4205 Firmware
Intel Pentium J4205
Intel Pentium J3710 Firmware
Intel Pentium J3710
and 1806 more
Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via adjacent access.
Intel Celeron J6413 Firmware
Intel Celeron J6413
Intel Celeron N6211 Firmware
Intel Celeron N6211
Intel Pentium J6425 Firmware
Intel Pentium J6425
and 590 more
Improper input validation in some firmware for Intel(R) AMT and Intel(R) Standard Manageability before versions 11.8.94, 11.12.94, 11.22.94, 12.0.93, 14.1.70, 15.0.45, and 16.1.27 in Intel (R) CSME ma...
Intel Converged Security Management Engine Firmware<11.12.94
Intel C232
Intel C236
Intel C420
Intel C422
Intel Cm236
and 134 more
Improper access control in the Intel(R) CSME software installer before version 2239.3.7.0 may allow an authenticated user to potentially enable escalation of privilege via local access.
Intel Converged Security Management Engine Firmware<11.12.94
Intel C232
Intel C236
Intel C420
Intel C422
Intel Cm236
and 437 more
Xen Security Advisory 435 v1 (CVE-2022-40982) - x86/Intel: Gather Data Sampling
debian/intel-microcode<=3.20230214.1~deb11u1<=3.20230512.1<=3.20220510.1~deb11u1
Redhat Enterprise Linux=6.0
Redhat Enterprise Linux=7.0
Redhat Enterprise Linux=8.0
Redhat Enterprise Linux=9.0
Xen Xen
and 2775 more
Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Xeon E-2314 Firmware
Intel Xeon E-2314
Intel Xeon E-2324g Firmware
Intel Xeon E-2324g
Intel Xeon E-2334 Firmware
Intel Xeon E-2334
and 540 more
Exposure of resource to wrong sphere in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
Intel Xeon E-2314 Firmware
Intel Xeon E-2314
Intel Xeon E-2324g Firmware
Intel Xeon E-2324g
Intel Xeon E-2334 Firmware
Intel Xeon E-2334
and 1863 more
Arbitrary Memory Disclosure through CPU Side-Channel Attacks (Retbleed)
redhat/kernel-rt<0:3.10.0-1160.80.1.rt56.1225.el7
redhat/kernel<0:3.10.0-1160.80.1.el7
redhat/kernel-rt<0:4.18.0-372.32.1.rt7.189.el8_6
redhat/kernel<0:4.18.0-372.32.1.el8_6
redhat/kernel<0:5.14.0-162.6.1.el9_1
redhat/kernel-rt<0:5.14.0-162.6.1.rt21.168.el9_1
and 669 more
Improper input validation for some Intel(R) Processors may allow an authenticated user to potentially cause a denial of service via local access.
Intel Xeon E3-1585 V5 Firmware
Intel Xeon E3-1585 V5
Intel Xeon E3-1585l V5 Firmware
Intel Xeon E3-1585l V5
Intel Xeon E3-1578l V5 Firmware
Intel Xeon E3-1578l V5
and 808 more
Hardware debug modes and processor INIT setting that allow override of locks for some Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT may allow an unauthenticated user to potentially enabl...
Intel Core I3-12100 Firmware<16.0.15
Intel Core I3-12100
Intel Core I3-12100f Firmware<16.0.15
Intel Core I3-12100f
Intel Core I3-12100t Firmware<16.0.15
Intel Core I3-12100t
and 790 more
Out-of-bounds write in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
Intel Xeon Gold 5220r Firmware
Intel Xeon Gold 5220r
and 1340 more
Improper access control in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
Intel Xeon Gold 5220r Firmware
Intel Xeon Gold 5220r
and 1340 more
Processor optimization removal or modification of security-critical code for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
debian/intel-microcode<=3.20220207.1~deb11u1<=3.20210608.2~deb10u1<=3.20220207.1
Intel Celeron N6210 Firmware
Intel Celeron N6210
Intel Celeron N4500 Firmware
Intel Celeron N4500
Intel Celeron N4505 Firmware
and 1594 more
Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via physical access.
Netapp Cloud Backup
Netapp Fas\/aff Bios
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
and 1354 more
Buffer overflow in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via physical access.
Netapp Cloud Backup
Netapp Fas\/aff Bios
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
and 1354 more
Improper input validation in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable an escalation of privilege via local access.
Netapp Cloud Backup
Netapp Fas\/aff Bios
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
and 1352 more
Pointer issues in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Netapp Cloud Backup
Netapp Fas\/aff Bios
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
and 1354 more
Out-of-bounds read in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Netapp Cloud Backup
Netapp Fas\/aff Bios
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
and 1354 more
Out-of-bounds write in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Netapp Cloud Backup
Netapp Fas\/aff Bios
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
and 1354 more
Improper access control in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via physical access.
Netapp Cloud Backup
Netapp Fas\/aff Bios
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
and 1354 more
Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
Improper access control in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
Insufficient control flow management in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable an escalation of privilege via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
Incorrect default permissions in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
NULL pointer dereference in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
Improper access control in the firmware for some Intel(R) Processors may allow an unauthenticated user to potentially enable an escalation of privilege via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
Insufficient control flow management in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Celeron N2805
Intel Celeron N2806
Intel Celeron N2807
Intel Celeron N2808
Intel Celeron N2810
Intel Celeron N2815
and 478 more
Intel Celeron N2805
Intel Celeron N2806
Intel Celeron N2807
Intel Celeron N2808
Intel Celeron N2810
Intel Celeron N2815
and 478 more
Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Atom C3000
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
and 1306 more
Insecure default variable initialization for the Intel BSSA DFT feature may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Atom C3000
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
and 1306 more
Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22 may allow a privileged user to po...
Intel Converged Security And Manageability Engine<12.0.81
Intel B360
Intel B365
Intel C242
Intel C246
Intel Celeron 4205u
and 370 more
Intel Converged Security And Manageability Engine<12.0.81
Intel B360
Intel B365
Intel C242
Intel C246
Intel Celeron 4205u
and 412 more
Intel Converged Security And Manageability Engine<12.0.81
Intel B360
Intel B365
Intel C242
Intel C246
Intel Celeron 4205u
and 218 more
Insufficient access control in the Linux kernel driver for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Intel Core I7-8510y Firmware
Intel Core I7-8510y
Intel Core I7-8500y Firmware
Intel Core I7-8500y
Intel Core I5-8310y Firmware
Intel Core I5-8310y
and 592 more
A vulnerability was found in Intel's implementation of RAPL (Running Average Power Limit). An attacker with a local account could query the power management functionality to intelligently infer SGX e...
Intel Core I7-8510y Firmware
Intel Core I7-8510y
Intel Core I7-8500y Firmware
Intel Core I7-8500y
Intel Core I5-8310y Firmware
Intel Core I5-8310y
and 596 more
Insufficient control flow in certain data structures for some Intel(R) Processors with Intel(R) Processor Graphics may allow an unauthenticated user to potentially enable information disclosure via lo...
Apple macOS Catalina<10.15.4
Apple Mojave
Apple High Sierra
ubuntu/linux<4.15.0-76.86
ubuntu/linux<5.3.0-29.31
ubuntu/linux<5.5~
and 1742 more
Improper conditions check in multiple Intel® Processors may allow an authenticated user to potentially enable partial escalation of privilege, denial of service and/or information disclosure via local...
Intel Xeon Platinum 9282 Firmware
Intel Xeon Platinum 9282
Intel Xeon Platinum 9242 Firmware
Intel Xeon Platinum 9242
Intel Xeon Platinum 9222 Firmware
Intel Xeon Platinum 9222
and 761 more
Improper conditions check in voltage settings for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege and/or information disclosure via local access.
Intel Xeon E3-1585 Firmware
Intel Xeon E3-1585=5
Intel Xeon E3-1585l Firmware
Intel Xeon E3-1585l=5
Intel Xeon E3-1578l Firmware
Intel Xeon E3-1578l=5
and 533 more
Insufficient access control in a subsystem for Intel (R) processor graphics in 6th, 7th, 8th and 9th Generation Intel(R) Core(TM) Processor Families; Intel(R) Pentium(R) Processor J, N, Silver and Gol...
redhat/kernel<0:2.6.32-754.24.3.el6
redhat/kernel-rt<0:3.10.0-1062.4.3.rt56.1029.el7
redhat/kernel<0:3.10.0-1062.4.3.el7
redhat/kernel<0:3.10.0-327.82.2.el7
redhat/kernel<0:3.10.0-514.70.3.el7
redhat/kernel<0:3.10.0-693.60.3.el7
and 1512 more
A flaw was found in computer hardware of the Intel microprocessors related to the instruction-side TLB (Translation Lookaside Buffer) that caches translations from guest (and host) virtual addresses i...
redhat/kernel<0:2.6.32-754.24.2.el6
redhat/kernel<0:2.6.32-431.96.3.el6
redhat/kernel<0:2.6.32-504.81.3.el6
redhat/kernel-rt<0:3.10.0-1062.4.2.rt56.1028.el7
redhat/kernel<0:3.10.0-1062.4.2.el7
redhat/kernel<0:3.10.0-327.82.2.el7
and 3213 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203