Lucene search

K
nvd[email protected]NVD:CVE-2019-0120
HistoryMay 17, 2019 - 4:29 p.m.

CVE-2019-0120

2019-05-1716:29:01
CWE-522
web.nvd.nist.gov
5

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

AI Score

4.4

Confidence

High

EPSS

0.001

Percentile

26.8%

Insufficient key protection vulnerability in silicon reference firmware for Intel® Pentium® Processor J Series, Intel® Pentium® Processor N Series, Intel® Celeron® J Series, Intel® Celeron® N Series, Intel® Atom® Processor A Series, Intel® Atom® Processor E3900 Series, Intel® Pentium® Processor Silver Series may allow a privileged user to potentially enable denial of service via local access.

Affected configurations

Nvd
Node
intelj5005Match-
AND
intelj5005_firmwareMatch-
Node
intelj4205Match-
AND
intelj4205_firmwareMatch-
Node
intelj3710Match-
AND
intelj3710_firmwareMatch-
Node
inteln3540Match-
AND
inteln3540_firmwareMatch-
Node
inteln3530Match-
AND
inteln3530_firmwareMatch-
Node
inteln5000Match-
AND
inteln5000_firmwareMatch-
Node
intelceleron_j4005Match-
AND
intelceleron_j4005_firmwareMatch-
Node
intelceleron_n4100Match-
AND
intelceleron_n4100_firmwareMatch-
Node
intelceleron_n4000_firmwareMatch-
AND
intelceleron_n4000Match-
Node
intelceleron_j4105_firmwareMatch-
AND
intelceleron_j4105Match-
Node
intelceleron_j3355_firmwareMatch-
AND
intelceleron_j3355Match-
Node
intelceleron_n3350_firmwareMatch-
AND
intelceleron_n3350Match-
Node
intelceleron_j3455_firmwareMatch-
AND
intelceleron_j3455Match-
Node
intelceleron_n3450_firmwareMatch-
AND
intelceleron_n3450Match-
Node
intelceleron_j3060_firmwareMatch-
AND
intelceleron_j3060Match-
Node
intelceleron_j3160_firmwareMatch-
AND
intelceleron_j3160Match-
Node
intelceleron_n3000Match-
AND
intelceleron_n3000_firmwareMatch-
Node
intelceleron_n2940_firmwareMatch-
AND
intelceleron_n2940Match-
Node
intelceleron_n2840_firmwareMatch-
AND
intelceleron_n2840Match-
Node
intelceleron_n2930_firmwareMatch-
AND
intelceleron_n2930Match-
Node
intelceleron_n2830_firmwareMatch-
AND
intelceleron_n2830Match-
Node
intelatom_330_firmwareMatch-
AND
intelatom_330Match-
Node
intelatom_230_firmwareMatch-
AND
intelatom_230Match-
Node
intelatom_x5-e3930_firmwareMatch-
AND
intelatom_x5-e3930Match-
Node
intelatom_x5-e3940_firmwareMatch-
AND
intelatom_x5-e3940Match-
Node
intelatom_x7-e3950_firmwareMatch-
AND
intelatom_x7-e3950Match-
Node
intelpentium_silver_j5005_firmwareMatch-
AND
intelpentium_silver_j5005Match-
Node
intelpentium_silver_n5000_firmwareMatch-
AND
intelpentium_silver_n5000Match-
VendorProductVersionCPE
intelj5005-cpe:2.3:h:intel:j5005:-:*:*:*:*:*:*:*
intelj5005_firmware-cpe:2.3:o:intel:j5005_firmware:-:*:*:*:*:*:*:*
intelj4205-cpe:2.3:h:intel:j4205:-:*:*:*:*:*:*:*
intelj4205_firmware-cpe:2.3:o:intel:j4205_firmware:-:*:*:*:*:*:*:*
intelj3710-cpe:2.3:h:intel:j3710:-:*:*:*:*:*:*:*
intelj3710_firmware-cpe:2.3:o:intel:j3710_firmware:-:*:*:*:*:*:*:*
inteln3540-cpe:2.3:h:intel:n3540:-:*:*:*:*:*:*:*
inteln3540_firmware-cpe:2.3:o:intel:n3540_firmware:-:*:*:*:*:*:*:*
inteln3530-cpe:2.3:h:intel:n3530:-:*:*:*:*:*:*:*
inteln3530_firmware-cpe:2.3:o:intel:n3530_firmware:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 561

CVSS2

2.1

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:N/I:N/A:P

CVSS3

4.4

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H

AI Score

4.4

Confidence

High

EPSS

0.001

Percentile

26.8%

Related for NVD:CVE-2019-0120