Vulnerabilities > Intel > High

DATE CVE VULNERABILITY TITLE RISK
2017-04-04 CVE-2017-5683 Local Privilege Escalation vulnerability in Intel Hardware Accelerated Execution Manager
Privilege escalation in IntelHAXM.sys driver in the Intel Hardware Accelerated Execution Manager before version 6.0.6 allows a local user to gain system level access.
local
low complexity
intel
7.2
2016-12-08 CVE-2016-8102 Permissions, Privileges, and Access Controls vulnerability in Intel Wireless Bluetooth Drivers
Unquoted service path vulnerability in Intel Wireless Bluetooth Drivers 16.x, 17.x, and before 18.1.1607.3129 allows local users to launch processes with elevated privileges.
local
low complexity
intel CWE-264
7.2
2016-10-10 CVE-2016-8101 Permissions, Privileges, and Access Controls vulnerability in Intel Solid-State Drive Toolbox
The updater subsystem in Intel SSD Toolbox before 3.3.7 allows local users to gain privileges via unspecified vectors.
local
low complexity
intel CWE-264
7.2
2016-01-29 CVE-2016-1493 Insufficient Verification of Data Authenticity vulnerability in Intel Driver Update Utility
Intel Driver Update Utility before 2.4 retrieves driver updates in cleartext, which makes it easier for man-in-the-middle attackers to execute arbitrary code via a crafted file.
network
high complexity
intel CWE-345
7.6
2013-08-25 CVE-2013-4219 Numeric Errors vulnerability in Intel Wimax Network Service 1.5.0/1.5.2
Multiple integer overflows in the Intel WiMAX Network Service through 1.5.2 for Intel Wireless WiMAX Connection 2400 devices allow remote attackers to cause a denial of service (component crash) or possibly execute arbitrary code via an L5 connection with a crafted PDU value that triggers a heap-based buffer overflow within (1) L5SocketsDispatcher.c or (2) L5Connector.c.
network
low complexity
intel CWE-189
7.5
2013-07-08 CVE-2013-4786 Credentials Management vulnerability in multiple products
The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication, which allows remote attackers to obtain password hashes and conduct offline password guessing attacks by obtaining the HMAC from a RAKP message 2 response from a BMC.
network
low complexity
oracle intel CWE-255
7.8
2012-09-15 CVE-2011-5174 Improper Restriction of Operations Within the Bounds of A Memory Buffer vulnerability in Intel products
Buffer overflow in Intel Trusted Execution Technology (TXT) SINIT Authenticated Code Modules (ACM) in Intel Q67 Express, C202, C204, C206 Chipsets, and Mobile Intel QM67, and QS67 Chipset before 2nd_gen_i5_i7_SINIT_51.BIN Express; Intel Q57, 3450 Chipsets and Mobile Intel QM57 and QS57 Express Chipset before i5_i7_DUAL_SINIT_51.BIN and i7_QUAD_SINIT_51.BIN; Mobile Intel GM45, GS45, and PM45 Express Chipset before GM45_GS45_PM45_SINIT_51.BIN; Intel Q35 Express Chipsets before Q35_SINIT_51.BIN; and Intel 5520, 5500, X58, and 7500 Chipsets before SINIT ACM 1.1 allows local users to bypass the Trusted Execution Technology protection mechanism and perform other unspecified SINIT ACM functions via unspecified vectors.
local
low complexity
intel CWE-119
7.2
2011-06-30 CVE-2011-2604 Resource Management Errors vulnerability in Intel G41 Driver 6.14.10.5355
The Intel G41 driver 6.14.10.5355 on Windows XP SP3 allows remote attackers to cause a denial of service (system crash) via a crafted web page that is visited with Google Chrome or Mozilla Firefox, as demonstrated by the lots-of-polys-example.html test page in the Khronos WebGL SDK.
7.1
2009-12-24 CVE-2009-4419 Configuration vulnerability in Intel products
Intel Q35, GM45, PM45 Express, Q45, and Q43 Express chipsets in the SINIT Authenticated Code Module (ACM), which allows local users to bypass the Trusted Execution Technology protection mechanism and gain privileges by modifying the MCHBAR register to point to an attacker-controlled region, which prevents the SENTER instruction from properly applying VT-d protection while an MLE is being loaded.
local
low complexity
intel CWE-16
7.2
2009-01-07 CVE-2009-0066 Security Bypass vulnerability in Intel Trusted Execution Technology NIL
Multiple unspecified vulnerabilities in Intel system software for Trusted Execution Technology (TXT) allow attackers to bypass intended loader integrity protections, as demonstrated by exploitation of tboot.
network
high complexity
intel
7.6