Описание
BMC Firmware in Intel server boards, compute modules, and systems potentially allow an attacker with administrative privileges to make unauthorized read\writes to the SMBUS.
Уязвимые конфигурации
Конфигурация 1
Одновременно
cpe:2.3:o:intel:bmc_firmware:-:*:*:*:*:*:*:*
Одно из
cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:bbs7200ap:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:bbs7200apl:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:dbs2600cw2r:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:dbs2600cw2sr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:dbs2600cwtr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:dbs2600cwtsr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600kpfr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600kpr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600tp24r:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600tp24sr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600tp24str:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600tpfr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600tpnr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns2600tpr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns7200ap:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns7200apl:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns7200apr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:hns7200aprl:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r1208wt2gsr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r1208wttgsr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r1304wt2gsr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r1304wttgsr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r2208wt2ysr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r2208wttyc1r:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r2208wttysr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r2224wttysr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r2308wttysr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:r2312wttysr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s2600kpfr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s2600kpr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s2600kptr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s2600tpfr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s2600tpnr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s2600tpr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s2600tptr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s2600wfo:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s2600wt2r:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s2600wttr:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s2600wtts1r:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:s7200apr:-:*:*:*:*:*:*:*
EPSS
Процентиль: 15%
0.00047
Низкий
8.2 High
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-269
Связанные уязвимости
CVSS3: 8.2
github
больше 3 лет назад
BMC Firmware in Intel server boards, compute modules, and systems potentially allow an attacker with administrative privileges to make unauthorized read\writes to the SMBUS.
EPSS
Процентиль: 15%
0.00047
Низкий
8.2 High
CVSS3
4.6 Medium
CVSS2
Дефекты
CWE-269