Latest intel xeon w-11855m Vulnerabilities

Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access.
Intel Pentium J6426 Firmware
Intel Pentium J6426
Intel Pentium J4205 Firmware
Intel Pentium J4205
Intel Pentium J3710 Firmware
Intel Pentium J3710
and 1806 more
Exposure of resource to wrong sphere in BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
Intel Xeon E-2314 Firmware
Intel Xeon E-2314
Intel Xeon E-2324g Firmware
Intel Xeon E-2324g
Intel Xeon E-2334 Firmware
Intel Xeon E-2334
and 1863 more
Improper initialization in the Intel(R) TXT SINIT ACM for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Core I7-11850he Firmware
Intel Core I7-11850he
Intel Core I7-11600h Firmware
Intel Core I7-11600h
Intel Core I7-11390h Firmware
Intel Core I7-11390h
and 928 more
Improper input validation in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Xeon Gold 5317 Firmware
Intel Xeon Gold 5317
Intel Xeon Gold 5318n Firmware
Intel Xeon Gold 5318n
Intel Xeon Gold 5318s Firmware
Intel Xeon Gold 5318s
and 448 more
Improper isolation of shared resources in some Intel(R) Processors may allow a privileged user to potentially enable information disclosure via local access.
Intel Pentium J4205 Firmware
Intel Pentium J4205
Intel Pentium N4200 Firmware
Intel Pentium N4200
Intel Pentium N4200e Firmware
Intel Pentium N4200e
and 662 more
Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
redhat/kernel-rt<0:3.10.0-1160.80.1.rt56.1225.el7
redhat/kernel<0:3.10.0-1160.80.1.el7
redhat/kernel-rt<0:4.18.0-425.3.1.rt7.213.el8
redhat/kernel<0:4.18.0-425.3.1.el8
redhat/kernel<0:4.18.0-372.41.1.el8_6
redhat/kernel<0:5.14.0-162.6.1.el9_1
and 2097 more
Sensitive information accessible by physical probing of JTAG interface for some Intel(R) Processors with SGX may allow an unprivileged user to potentially enable information disclosure via physical ac...
Intel Celeron G5205u Firmware
Intel Celeron G5205u
Intel Celeron G5305u Firmware
Intel Celeron G5305u
Intel Celeron G5900 Firmware
Intel Celeron G5900
and 912 more
Improper access control in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
Intel Xeon Gold 5220r Firmware
Intel Xeon Gold 5220r
and 1340 more
Out-of-bounds write in the BIOS authenticated code module for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
Intel Xeon Gold 5220r Firmware
Intel Xeon Gold 5220r
and 1340 more
Non-transparent sharing of branch predictor within a context in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
redhat/kernel-rt<0:4.18.0-372.9.1.rt7.166.el8
redhat/kernel<0:4.18.0-372.9.1.el8
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
and 623 more
Non-transparent sharing of branch predictor selectors between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.
redhat/kernel-rt<0:4.18.0-372.9.1.rt7.166.el8
redhat/kernel<0:4.18.0-372.9.1.el8
Intel Atom P5921b
Intel Atom P5931b
Intel Atom P5942b
Intel Atom P5962b
and 578 more
Pointer issues in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Netapp Cloud Backup
Netapp Fas\/aff Bios
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
and 1354 more
Out-of-bounds read in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Netapp Cloud Backup
Netapp Fas\/aff Bios
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
and 1354 more
Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via physical access.
Netapp Cloud Backup
Netapp Fas\/aff Bios
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
and 1354 more
Improper access control in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via physical access.
Netapp Cloud Backup
Netapp Fas\/aff Bios
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
and 1354 more
Buffer overflow in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
Improper input validation in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable an escalation of privilege via local access.
Netapp Cloud Backup
Netapp Fas\/aff Bios
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
and 1352 more
Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via physical access.
Netapp Cloud Backup
Netapp Fas\/aff Bios
Intel Xeon Bronze 3206r Firmware
Intel Xeon Bronze 3206r
Intel Xeon Gold 5218r Firmware
Intel Xeon Gold 5218r
and 1354 more
NULL pointer dereference in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
Incorrect default permissions in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
Improper access control in the firmware for some Intel(R) Processors may allow an unauthenticated user to potentially enable an escalation of privilege via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
Insufficient control flow management in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable an escalation of privilege via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
Insufficient control flow management in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
Improper access control in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access.
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
Intel Atom C3508
and 675 more
Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access.
NetApp Clustered Data ONTAP
Intel Celeron G1610
Intel Celeron G1610t
Intel Celeron G1620
Intel Celeron G1620t
Intel Celeron G1630
and 757 more
Improper initialization of shared resources in some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
Netapp Fas\/aff Bios
Intel Celeron 6305
Intel Celeron 6305e
Intel Celeron 6600he
Intel Core I3-1000g1
Intel Core I3-1000g4
and 123 more
Insufficient control flow management in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel Celeron N2805
Intel Celeron N2806
Intel Celeron N2807
Intel Celeron N2808
Intel Celeron N2810
Intel Celeron N2815
and 478 more
Intel Celeron N2805
Intel Celeron N2806
Intel Celeron N2807
Intel Celeron N2808
Intel Celeron N2810
Intel Celeron N2815
and 478 more
Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Atom C3000
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
and 1306 more
Intel Optane Persistent Memory Firmware<2.2.0.1547
Intel Xeon Gold 5315y
Intel Xeon Gold 5317
Intel Xeon Gold 5318h
Intel Xeon Gold 5318n
Intel Xeon Gold 5318s
and 187 more
Insecure default variable initialization for the Intel BSSA DFT feature may allow a privileged user to potentially enable an escalation of privilege via local access.
Intel Atom C3000
Intel Atom C3308
Intel Atom C3336
Intel Atom C3338
Intel Atom C3338r
Intel Atom C3436l
and 1306 more
Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access.
Intel BIOS
Intel Core I3-l13g4
Intel Core I5-l16g7
Intel Core I7-10510u
Intel Core I7-10510y
Intel Core I7-1060g7
and 533 more
Improper buffer restrictions in a subsystem in the Intel(R) CSME versions before 11.8.86, 11.12.86, 11.22.86, 12.0.81, 13.0.47, 13.30.17, 14.1.53, 14.5.32 and 15.0.22 may allow a privileged user to po...
Intel Converged Security And Manageability Engine<12.0.81
Intel B360
Intel B365
Intel C242
Intel C246
Intel Celeron 4205u
and 370 more
Improper initialization in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.
Intel BIOS
Intel Core I3-l13g4
Intel Core I5-l16g7
Intel Core I7-10510u
Intel Core I7-10510y
Intel Core I7-1060g7
and 562 more
Out of bounds read in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access.
Intel BIOS
Intel Core I3-l13g4
Intel Core I5-l16g7
Intel Core I7-10510u
Intel Core I7-10510y
Intel Core I7-1060g7
and 546 more
Insufficient control flow management in the firmware for some Intel(R) Processors may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Intel BIOS
Intel Core I3-l13g4
Intel Core I5-l16g7
Intel Core I7-10510u
Intel Core I7-10510y
Intel Core I7-1060g7
and 540 more
Out of bounds write in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable denial of service via local access.
Intel BIOS
Intel Core I3-l13g4
Intel Core I5-l16g7
Intel Core I7-10510u
Intel Core I7-10510y
Intel Core I7-1060g7
and 542 more
Intel Converged Security And Manageability Engine<12.0.81
Intel B360
Intel B365
Intel C242
Intel C246
Intel Celeron 4205u
and 218 more
Intel Converged Security And Manageability Engine<12.0.81
Intel B360
Intel B365
Intel C242
Intel C246
Intel Celeron 4205u
and 412 more

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203