Intel STK2MV64CC

CPE Details

Intel STK2MV64CC
-
2023-05-19
18h11 +00:00
2023-06-27
10h45 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:h:intel:stk2mv64cc:-:*:*:*:*:*:*:*

Informations

Vendor

intel

Product

stk2mv64cc

Version

-

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2022-28699 2023-05-10 13h16 +00:00 Improper input validation for some Intel(R) NUC BIOS firmware may allow a privileged user to potentially enable escalation of privilege via local access.
7.5
High
CVE-2022-24436 2022-06-15 20h08 +00:00 Observable behavioral in power management throttling for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via network access.
6.5
Medium
CVE-2020-8742 2020-08-13 00h15 +00:00 Improper input validation in the firmware for Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access.
6.7
Medium
CVE-2019-14612 2019-12-16 18h11 +00:00 Out of bounds write in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
6.7
Medium
CVE-2019-14611 2019-12-16 18h11 +00:00 Integer overflow in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
6.7
Medium
CVE-2019-14609 2019-12-16 18h11 +00:00 Improper input validation in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
6.7
Medium
CVE-2019-14610 2019-12-16 18h11 +00:00 Improper access control in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access.
7.8
High
CVE-2019-14608 2019-12-16 18h10 +00:00 Improper buffer restrictions in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access.
7.8
High
CVE-2017-5691 2017-07-26 15h00 +00:00 Incorrect check in Intel processors from 6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Product Families, and Intel Xeon E3-1200 v5 and v6 Product Families allows compromised system firmware to impact SGX security via incorrect early system state.
9
Critical
CVE-2017-5684 2017-04-03 19h00 +00:00 The BIOS in Intel Compute Stick systems based on 6th Gen Intel Core processors prior to version CC047 may allow an attacker with physical access to the system to gain access to personal information.
3.9
Low
CVE-2016-8103 2016-12-08 16h00 +00:00 SMM call out in all Intel Branded NUC Kits allows a local privileged user to access the System Management Mode and take full control of the platform.
6.7
Medium