Lucene search

K
cve[email protected]CVE-2018-12204
HistoryMar 14, 2019 - 8:29 p.m.

CVE-2018-12204

2019-03-1420:29:00
CWE-665
web.nvd.nist.gov
34
cve-2018-12204
intel
firmware
privilege escalation
security vulnerability
nvd

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

26.9%

Improper memory initialization in Platform Sample/Silicon Reference firmware Intel® Server Board, Intel® Server System and Intel® Compute Module may allow privileged user to potentially enable an escalation of privilege via local access.

Affected configurations

NVD
Node
intelplatform_sample_firmwareMatch-
AND
intelbbs2600bpbMatch-
OR
intelbbs2600bpqMatch-
OR
intelbbs2600bpsMatch-
OR
intelbbs2600stbMatch-
OR
intelbbs2600stqMatch-
OR
intelbbs7200apMatch-
OR
intelbbs7200aplMatch-
OR
inteldbs2600cw2rMatch-
OR
inteldbs2600cw2srMatch-
OR
inteldbs2600cwtrMatch-
OR
inteldbs2600cwtsrMatch-
OR
intelhns2600bpbMatch-
OR
intelhns2600bpb24Match-
OR
intelhns2600bpblcMatch-
OR
intelhns2600bpblc24Match-
OR
intelhns2600bpqMatch-
OR
intelhns2600bpq24Match-
OR
intelhns2600bpsMatch-
OR
intelhns2600bps24Match-
OR
intelhns2600kpfrMatch-
OR
intelhns2600kprMatch-
OR
intelhns2600tp24rMatch-
OR
intelhns2600tp24srMatch-
OR
intelhns2600tp24strMatch-
OR
intelhns2600tpfrMatch-
OR
intelhns2600tpnrMatch-
OR
intelhns2600tprMatch-
OR
intelhns7200apMatch-
OR
intelhns7200aplMatch-
OR
intelhns7200aprMatch-
OR
intelhns7200aprlMatch-
OR
intelr1208wftysMatch-
OR
intelr1208wt2gsrMatch-
OR
intelr1208wttgsrMatch-
OR
intelr1304wf0ysMatch-
OR
intelr1304wftysMatch-
OR
intelr1304wt2gsrMatch-
OR
intelr1304wttgsrMatch-
OR
intelr2208wf0zsMatch-
OR
intelr2208wfqzsMatch-
OR
intelr2208wftzsMatch-
OR
intelr2208wt2ysrMatch-
OR
intelr2208wttyc1rMatch-
OR
intelr2208wttysrMatch-
OR
intelr2224wfqzsMatch-
OR
intelr2224wftzsMatch-
OR
intelr2224wttysrMatch-
OR
intelr2308wftzsMatch-
OR
intelr2308wttysrMatch-
OR
intelr2312wf0npMatch-
OR
intelr2312wfqzsMatch-
OR
intelr2312wftzsMatch-
OR
intelr2312wttysrMatch-
OR
intels2600kpfrMatch-
OR
intels2600kprMatch-
OR
intels2600kptrMatch-
OR
intels2600stbMatch-
OR
intels2600stqMatch-
OR
intels2600tpfrMatch-
OR
intels2600tpnrMatch-
OR
intels2600tprMatch-
OR
intels2600tptrMatch-
OR
intels2600wfoMatch-
OR
intels2600wfqMatch-
OR
intels2600wftMatch-
OR
intels2600wt2rMatch-
OR
intels2600wttrMatch-
OR
intels2600wtts1rMatch-
OR
intels7200aprMatch-
Node
intelsilicon_reference_firmwareMatch-
AND
intelbbs2600bpbMatch-
OR
intelbbs2600bpqMatch-
OR
intelbbs2600bpsMatch-
OR
intelbbs2600stbMatch-
OR
intelbbs2600stqMatch-
OR
intelbbs7200apMatch-
OR
intelbbs7200aplMatch-
OR
inteldbs2600cw2rMatch-
OR
inteldbs2600cw2srMatch-
OR
inteldbs2600cwtrMatch-
OR
inteldbs2600cwtsrMatch-
OR
intelhns2600bpbMatch-
OR
intelhns2600bpb24Match-
OR
intelhns2600bpblcMatch-
OR
intelhns2600bpblc24Match-
OR
intelhns2600bpqMatch-
OR
intelhns2600bpq24Match-
OR
intelhns2600bpsMatch-
OR
intelhns2600bps24Match-
OR
intelhns2600kpfrMatch-
OR
intelhns2600kprMatch-
OR
intelhns2600tp24rMatch-
OR
intelhns2600tp24srMatch-
OR
intelhns2600tp24strMatch-
OR
intelhns2600tpfrMatch-
OR
intelhns2600tpnrMatch-
OR
intelhns2600tprMatch-
OR
intelhns7200apMatch-
OR
intelhns7200aplMatch-
OR
intelhns7200aprMatch-
OR
intelhns7200aprlMatch-
OR
intelr1208wftysMatch-
OR
intelr1208wt2gsrMatch-
OR
intelr1208wttgsrMatch-
OR
intelr1304wf0ysMatch-
OR
intelr1304wftysMatch-
OR
intelr1304wt2gsrMatch-
OR
intelr1304wttgsrMatch-
OR
intelr2208wf0zsMatch-
OR
intelr2208wfqzsMatch-
OR
intelr2208wftzsMatch-
OR
intelr2208wt2ysrMatch-
OR
intelr2208wttyc1rMatch-
OR
intelr2208wttysrMatch-
OR
intelr2224wfqzsMatch-
OR
intelr2224wftzsMatch-
OR
intelr2224wttysrMatch-
OR
intelr2308wftzsMatch-
OR
intelr2308wttysrMatch-
OR
intelr2312wf0npMatch-
OR
intelr2312wfqzsMatch-
OR
intelr2312wftzsMatch-
OR
intelr2312wttysrMatch-
OR
intels2600kpfrMatch-
OR
intels2600kprMatch-
OR
intels2600kptrMatch-
OR
intels2600stbMatch-
OR
intels2600stqMatch-
OR
intels2600tpfrMatch-
OR
intels2600tpnrMatch-
OR
intels2600tprMatch-
OR
intels2600tptrMatch-
OR
intels2600wfoMatch-
OR
intels2600wfqMatch-
OR
intels2600wftMatch-
OR
intels2600wt2rMatch-
OR
intels2600wttrMatch-
OR
intels2600wtts1rMatch-
OR
intels7200aprMatch-

CNA Affected

[
  {
    "product": "Intel Platform Sample / Silicon Reference firmware",
    "vendor": "Intel Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "Multiple versions."
      }
    ]
  }
]

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.001 Low

EPSS

Percentile

26.9%