Latest intel xeon d-2712t firmware Vulnerabilities

Intel - Denial of Service - Privilege Escalation (Reptar)
Intel Sapphire Rapids
Intel Alder Lake
Intel Raptor Lake
debian/intel-microcode<=3.20220510.1~deb10u1<=3.20230808.1~deb11u1
debian/intel-microcode<=3.20230808.1<=3.20230808.1~deb12u1<=3.20230808.1~deb11u1
Intel Core I3-10100y Firmware
and 446 more
Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access.
Intel Pentium J6426 Firmware
Intel Pentium J6426
Intel Pentium J4205 Firmware
Intel Pentium J4205
Intel Pentium J3710 Firmware
Intel Pentium J3710
and 1806 more
Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Atom C3338r Firmware
Intel Atom C3338r
Intel Atom C3436l Firmware
Intel Atom C3436l
Intel Atom C3558r Firmware
Intel Atom C3558r
and 222 more
Improper initialization in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
Intel Xeon D-2745nx Firmware
Intel Xeon D-2745nx
Intel Xeon D-2757nx Firmware
Intel Xeon D-2757nx
Intel Xeon D-2777nx Firmware
Intel Xeon D-2777nx
and 468 more
Improper access control in some 3rd Generation Intel(R) Xeon(R) Scalable processors may allow a privileged user to potentially enable information disclosure via local access.
Intel Microcode<20230808
Intel Xeon D-1513n
Intel Xeon D-1518
Intel Xeon D-1520
Intel Xeon D-1521
Intel Xeon D-1523n
and 690 more
Unauthorized error injection in Intel(R) SGX or Intel(R) TDX for some Intel(R) Xeon(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
ubuntu/intel-microcode<3.20230808.0ubuntu0.18.04.1+
ubuntu/intel-microcode<3.20230808.0ubuntu0.20.04.1
ubuntu/intel-microcode<3.20230808.0ubuntu0.22.04.1
ubuntu/intel-microcode<3.20230808.0ubuntu1
ubuntu/intel-microcode<3.20230808.0ubuntu0.16.04.1+
ubuntu/intel-microcode<3.20230808.1
and 767 more
Xen Security Advisory 435 v1 (CVE-2022-40982) - x86/Intel: Gather Data Sampling
debian/intel-microcode<=3.20230214.1~deb11u1<=3.20230512.1<=3.20220510.1~deb11u1
Redhat Enterprise Linux=6.0
Redhat Enterprise Linux=7.0
Redhat Enterprise Linux=8.0
Redhat Enterprise Linux=9.0
Xen Xen
and 2772 more
Exposure of resource to wrong sphere in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
Intel Xeon E-2314 Firmware
Intel Xeon E-2314
Intel Xeon E-2324g Firmware
Intel Xeon E-2324g
Intel Xeon E-2334 Firmware
Intel Xeon E-2334
and 1863 more
Incorrect default permissions in some memory controller configurations for some Intel(R) Xeon(R) Processors when using Intel(R) Software Guard Extensions which may allow a privileged user to potential...
Intel Xeon Gold 5315y Firmware
Intel Xeon Gold 5315y
Intel Xeon Gold 5317 Firmware
Intel Xeon Gold 5317
Intel Xeon Gold 5318n Firmware
Intel Xeon Gold 5318n
and 266 more
Improper access control in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Xeon Bronze 3104 Firmware
Intel Xeon Bronze 3104
Intel Xeon Bronze 3106 Firmware
Intel Xeon Bronze 3106
Intel Xeon Bronze 3204 Firmware
Intel Xeon Bronze 3204
and 412 more
Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
Intel Pentium J4205 Firmware
Intel Pentium J4205
Intel Pentium N4200 Firmware
Intel Pentium N4200
Intel Pentium N4200e Firmware
Intel Pentium N4200e
and 662 more
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
redhat/kernel-rt<0:3.10.0-1160.80.1.rt56.1225.el7
redhat/kernel<0:3.10.0-1160.80.1.el7
redhat/kernel-rt<0:4.18.0-425.3.1.rt7.213.el8
redhat/kernel<0:4.18.0-425.3.1.el8
redhat/kernel<0:4.18.0-372.41.1.el8_6
redhat/kernel<0:5.14.0-162.6.1.el9_1
and 2097 more
Hardware debug modes and processor INIT setting that allow override of locks for some Intel(R) Processors in Intel(R) Boot Guard and Intel(R) TXT may allow an unauthenticated user to potentially enabl...
Intel Core I3-12100 Firmware<16.0.15
Intel Core I3-12100
Intel Core I3-12100f Firmware<16.0.15
Intel Core I3-12100f
Intel Core I3-12100t Firmware<16.0.15
Intel Core I3-12100t
and 790 more
Out-of-bounds write in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
Intel Xeon Gold 5220r Firmware
Intel Xeon Gold 5220r
and 1340 more
Improper access control in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
Intel Xeon Gold 5220r Firmware
Intel Xeon Gold 5220r
and 1340 more
Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.
Intel Xeon E-2314 Firmware
Intel Xeon E-2314
Intel Xeon E-2324g Firmware
Intel Xeon E-2324g
Intel Xeon E-2334 Firmware
Intel Xeon E-2334
and 500 more
Unchecked return value in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
Intel Xeon E7-8894 V4 Firmware
Intel Xeon E7-8894 V4
Intel Xeon E7-4809 V4 Firmware
Intel Xeon E7-4809 V4
Intel Xeon E7-4820 V4 Firmware
Intel Xeon E7-4820 V4
and 340 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203