Lucene search

K

CVE-2018-3652

🗓️ 10 Jul 2018 21:00:29Reported by intelType 
cve
 cve
🔗 web.nvd.nist.gov👁 38 Views

Existing UEFI setting restrictions for DCI in specific Intel Xeon processors enables access to platform secrets via debug interfaces

Show more
Related
Detection
Affected
Refs
ReporterTitlePublishedViews
Family
Lenovo
Intel DCI Policy Update - US
28 Nov 201814:20
lenovo
Lenovo
Intel DCI Policy Update - Lenovo Support US
28 Nov 201814:20
lenovo
NVD
CVE-2018-3652
10 Jul 201821:29
nvd
Cvelist
CVE-2018-3652
10 Jul 201821:00
cvelist
Hewlett-Packard
HPSBHF03586 rev. 1 - DCI Policy Update
6 Jul 201800:00
hp
Prion
Design/Logic Flaw
10 Jul 201821:29
prion
Nvd
Node
OROROROR
intelxeon_goldMatch5119t
OROR
intelxeon_goldMatch5120t
OROROR
intelxeon_goldMatch6126f
OR
intelxeon_goldMatch6126t
OROROR
intelxeon_goldMatch6130f
OR
intelxeon_goldMatch6130t
OROROR
intelxeon_goldMatch6134m
OROROR
intelxeon_goldMatch6138f
OR
intelxeon_goldMatch6138p
OR
intelxeon_goldMatch6138t
OROR
intelxeon_goldMatch6140m
OROR
intelxeon_goldMatch6142f
OR
intelxeon_goldMatch6142m
OROROROR
intelxeon_goldMatch6148f
OROROROROROROROROROROROROROROROROROROROROROROROROROROR
Node
intelxeonMatchd-1513n
OR
intelxeonMatchd-1518
OR
intelxeonMatchd-1520
OR
intelxeonMatchd-1521
OR
intelxeonMatchd-1523n
OR
intelxeonMatchd-1527
OR
intelxeonMatchd-1528
OR
intelxeonMatchd-1529
OR
intelxeonMatchd-1531
OR
intelxeonMatchd-1533n
OR
intelxeonMatchd-1537
OR
intelxeonMatchd-1539
OR
intelxeonMatchd-1540
OR
intelxeonMatchd-1541
OR
intelxeonMatchd-1543n
OR
intelxeonMatchd-1548
OR
intelxeonMatchd-1553n
OR
intelxeonMatchd-1557
OR
intelxeonMatchd-1559
OR
intelxeonMatchd-1567
OR
intelxeonMatchd-1571
OR
intelxeonMatchd-1577
OR
intelxeonMatchd-2123it
OR
intelxeonMatchd-2141i
OR
intelxeonMatchd-2142it
OR
intelxeonMatchd-2143it
OR
intelxeonMatchd-2145nt
OR
intelxeonMatchd-2146nt
OR
intelxeonMatchd-2161i
OR
intelxeonMatchd-2163it
OR
intelxeonMatchd-2166nt
OR
intelxeonMatchd-2173it
OR
intelxeonMatchd-2177nt
OR
intelxeonMatchd-2183it
OR
intelxeonMatchd-2187nt
Node
intelatom_cMatchc2308
OR
intelatom_cMatchc2316
OR
intelatom_cMatchc2338
OR
intelatom_cMatchc2350
OR
intelatom_cMatchc2358
OR
intelatom_cMatchc2508
OR
intelatom_cMatchc2516
OR
intelatom_cMatchc2518
OR
intelatom_cMatchc2530
OR
intelatom_cMatchc2538
OR
intelatom_cMatchc2550
OR
intelatom_cMatchc2558
OR
intelatom_cMatchc2718
OR
intelatom_cMatchc2730
OR
intelatom_cMatchc2738
OR
intelatom_cMatchc2750
OR
intelatom_cMatchc2758
OR
intelatom_cMatchc3308
OR
intelatom_cMatchc3336
OR
intelatom_cMatchc3338
OR
intelatom_cMatchc3508
OR
intelatom_cMatchc3538
OR
intelatom_cMatchc3558
OR
intelatom_cMatchc3708
OR
intelatom_cMatchc3750
OR
intelatom_cMatchc3758
OR
intelatom_cMatchc3808
OR
intelatom_cMatchc3830
OR
intelatom_cMatchc3850
OR
intelatom_cMatchc3858
OR
intelatom_cMatchc3950
OR
intelatom_cMatchc3955
OR
intelatom_cMatchc3958
[
  {
    "product": "Intel Xeon Processor",
    "vendor": "Intel Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family"
      }
    ]
  }
]

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
10 Jul 2018 21:29Current
7.2High risk
Vulners AI Score7.2
CVSS24.6
CVSS37.6
EPSS0.00077
38
.json
Report