Latest intel xeon gold 6142m Vulnerabilities

Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Atom C3000
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
and 1306 more
Insecure default variable initialization for the Intel BSSA DFT feature may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Atom C3000
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
and 1306 more
Intel Secl-dc<3.3
Intel Xeon Bronze 3104
Intel Xeon Bronze 3106
Intel Xeon Bronze 3204
Intel Xeon Bronze 3206r
Intel Xeon Gold 5115
and 213 more
Missing release of resource after effective lifetime in an API for the Intel(R) Security Library before version 3.3 may allow a privileged user to potentially enable denial of service via network acce...
Intel Secl-dc<3.3
Intel Xeon Bronze 3104
Intel Xeon Bronze 3106
Intel Xeon Bronze 3204
Intel Xeon Bronze 3206r
Intel Xeon Gold 5115
and 213 more
Intel Secl-dc<3.3
Intel Xeon Bronze 3104
Intel Xeon Bronze 3106
Intel Xeon Bronze 3204
Intel Xeon Bronze 3206r
Intel Xeon Gold 5115
and 213 more
Intel Secl-dc<3.3
Intel Xeon Bronze 3104
Intel Xeon Bronze 3106
Intel Xeon Bronze 3204
Intel Xeon Bronze 3206r
Intel Xeon Gold 5115
and 213 more
Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access.
Intel BIOS
Intel Core I3-l13g4
Intel Core I5-l16g7
Intel Core I7-10510u
Intel Core I7-10510y
Intel Core I7-1060g7
and 533 more
Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel BIOS
Intel Core I3-l13g4
Intel Core I5-l16g7
Intel Core I7-10510u
Intel Core I7-10510y
Intel Core I7-1060g7
and 562 more
Out of bounds read in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.
Intel BIOS
Intel Core I3-l13g4
Intel Core I5-l16g7
Intel Core I7-10510u
Intel Core I7-10510y
Intel Core I7-1060g7
and 546 more
Insufficient control flow management in the firmware for some Intel(R) Processors may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Intel BIOS
Intel Core I3-l13g4
Intel Core I5-l16g7
Intel Core I7-10510u
Intel Core I7-10510y
Intel Core I7-1060g7
and 540 more
Out of bounds write in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access.
Intel BIOS
Intel Core I3-l13g4
Intel Core I5-l16g7
Intel Core I7-10510u
Intel Core I7-10510y
Intel Core I7-1060g7
and 542 more
Improper removal of sensitive information before storage or transfer in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Intel Microcode
Intel Celeron 3855u
Intel Celeron 3865u
Intel Celeron 3955u
Intel Celeron 3965u
Intel Celeron 3965y
and 496 more
Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The ...
Intel Atom C2308
Intel Atom C2316
Intel Atom C2338
Intel Atom C2350
Intel Atom C2358
Intel Atom C2508
and 1315 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203