CVE-2019-14610

Improper access control in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:intel:nuc_8_mainstream_game_kit_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc_8_mainstream_game_kit:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:intel:nuc_8_mainstream_game_mini_computer_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc_8_mainstream_game_mini_computer:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:o:intel:nuc8i7bek_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc8i7bek:-:*:*:*:*:*:*:*

Configuration 4 (hide)

AND
cpe:2.3:o:intel:cd1p64gk_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:cd1p64gk:-:*:*:*:*:*:*:*

Configuration 5 (hide)

AND
cpe:2.3:o:intel:nuc8i3cysm_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc8i3cysm:-:*:*:*:*:*:*:*

Configuration 6 (hide)

AND
cpe:2.3:o:intel:nuc8i7hnk_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc8i7hnk:-:*:*:*:*:*:*:*

Configuration 7 (hide)

AND
cpe:2.3:o:intel:nuc7i7dnke_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc7i7dnke:-:*:*:*:*:*:*:*

Configuration 8 (hide)

AND
cpe:2.3:o:intel:nuc7i5dnke_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc7i5dnke:-:*:*:*:*:*:*:*

Configuration 9 (hide)

AND
cpe:2.3:o:intel:nuc7i3dnhe_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc7i3dnhe:-:*:*:*:*:*:*:*

Configuration 10 (hide)

AND
cpe:2.3:o:intel:stk2mv64cc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:stk2mv64cc:-:*:*:*:*:*:*:*

Configuration 11 (hide)

AND
cpe:2.3:o:intel:stk2m3w64cc_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:stk2m3w64cc:-:*:*:*:*:*:*:*

Configuration 12 (hide)

AND
cpe:2.3:o:intel:nuc6i7kyk_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc6i7kyk:-:*:*:*:*:*:*:*

Configuration 13 (hide)

AND
cpe:2.3:o:intel:nuc6i5syh_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc6i5syh:-:*:*:*:*:*:*:*

Configuration 14 (hide)

AND
cpe:2.3:o:intel:nuc7cjyh_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc7cjyh:-:*:*:*:*:*:*:*

Configuration 15 (hide)

AND
cpe:2.3:o:intel:cd1m3128mk_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:cd1m3128mk:-:*:*:*:*:*:*:*

Configuration 16 (hide)

AND
cpe:2.3:o:intel:cd1iv128mk_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:cd1iv128mk:-:*:*:*:*:*:*:*

Configuration 17 (hide)

AND
cpe:2.3:o:intel:nuc6cays_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:nuc6cays:-:*:*:*:*:*:*:*

Configuration 18 (hide)

AND
cpe:2.3:o:intel:de3815tybe_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:de3815tybe:-:*:*:*:*:*:*:*

Configuration 19 (hide)

AND
cpe:2.3:o:intel:d34010wyb_firmware:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:d34010wyb:-:*:*:*:*:*:*:*

History

21 Nov 2024, 04:27

Type Values Removed Values Added
References () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html - Patch, Vendor Advisory () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html - Patch, Vendor Advisory

Information

Published : 2019-12-16 20:15

Updated : 2024-11-21 04:27


NVD link : CVE-2019-14610

Mitre link : CVE-2019-14610

CVE.ORG link : CVE-2019-14610


JSON object : View

Products Affected

intel

  • nuc_8_mainstream_game_kit_firmware
  • nuc8i7hnk
  • stk2m3w64cc
  • nuc6cays_firmware
  • nuc6i7kyk
  • nuc7cjyh
  • stk2mv64cc_firmware
  • nuc6i5syh_firmware
  • cd1iv128mk_firmware
  • nuc8i7bek_firmware
  • nuc8i3cysm_firmware
  • de3815tybe_firmware
  • nuc7i3dnhe_firmware
  • nuc_8_mainstream_game_mini_computer
  • nuc7i7dnke_firmware
  • cd1iv128mk
  • cd1m3128mk_firmware
  • d34010wyb_firmware
  • cd1p64gk_firmware
  • cd1m3128mk
  • de3815tybe
  • nuc8i3cysm
  • cd1p64gk
  • nuc8i7hnk_firmware
  • nuc7cjyh_firmware
  • d34010wyb
  • nuc_8_mainstream_game_kit
  • stk2m3w64cc_firmware
  • nuc7i7dnke
  • nuc6cays
  • stk2mv64cc
  • nuc_8_mainstream_game_mini_computer_firmware
  • nuc6i5syh
  • nuc8i7bek
  • nuc7i5dnke
  • nuc7i3dnhe
  • nuc6i7kyk_firmware
  • nuc7i5dnke_firmware