CVE-2021-0051

Improper input validation in the Intel(R) SPS versions before SPS_E5_04.04.04.023.0, SPS_E5_04.04.03.228.0 or SPS_SoC-A_05.00.03.098.0 may allow a privileged user to potentially enable denial of service via local access.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:intel:server_platform_services:*:*:*:*:*:*:*:*
OR cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c624a:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:a:intel:server_platform_services:*:*:*:*:*:*:*:*
OR cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c624a:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
cpe:2.3:a:intel:server_platform_services:*:*:*:*:*:*:*:*
OR cpe:2.3:h:intel:atom_p5921b:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_p5931b:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_p5962b:-:*:*:*:*:*:*:*

History

14 Sep 2021, 14:32

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20210716-0001/ - Third Party Advisory

28 Jun 2021, 17:43

Type Values Removed Values Added
References (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00500.html - (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00500.html - Vendor Advisory
CWE CWE-20
CPE cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_p5921b:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_p5931b:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*
cpe:2.3:a:intel:server_platform_services:*:*:*:*:*:*:*:*
cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c624a:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_p5962b:-:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 2.1
v3 : 4.4

09 Jun 2021, 20:19

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-09 20:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-0051

Mitre link : CVE-2021-0051

CVE.ORG link : CVE-2021-0051


JSON object : View

Products Affected

intel

  • atom_p5931b
  • c622
  • c626
  • c627
  • server_platform_services
  • c621
  • c624a
  • atom_p5942b
  • atom_p5962b
  • c629a
  • c629
  • atom_p5921b
  • c627a
  • c628
  • c625
  • c624
CWE
CWE-20

Improper Input Validation