Improper input validation in the Intel(R) Ethernet Controllers X722 and 800 series Linux RMDA driver before version 1.3.19 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://security.netapp.com/advisory/ntap-20210827-0008/ | Third Party Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00515.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
History
14 Sep 2021, 18:34
Type | Values Removed | Values Added |
---|---|---|
References | (CONFIRM) https://security.netapp.com/advisory/ntap-20210827-0008/ - Third Party Advisory |
27 Aug 2021, 07:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
20 Aug 2021, 17:02
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-20 | |
References | (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00515.html - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 7.8 |
CPE | cpe:2.3:o:intel:ethernet_controller_e810_firmware:*:*:*:*:*:linux:*:* cpe:2.3:h:intel:x722da2:-:*:*:*:*:*:*:* cpe:2.3:h:intel:x722da4fh:-:*:*:*:*:*:*:* cpe:2.3:h:intel:ethernet_controller_e810:-:*:*:*:*:*:*:* cpe:2.3:o:intel:x722da4g1p5_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:x722da4g1p5:-:*:*:*:*:*:*:* cpe:2.3:o:intel:x722da2_firmware:*:*:*:*:*:*:*:* cpe:2.3:o:intel:x722da4fh_firmware:*:*:*:*:*:*:*:* |
11 Aug 2021, 13:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-08-11 13:15
Updated : 2024-02-04 21:47
NVD link : CVE-2021-0084
Mitre link : CVE-2021-0084
CVE.ORG link : CVE-2021-0084
JSON object : View
Products Affected
intel
- ethernet_controller_e810_firmware
- x722da4fh_firmware
- x722da4fh
- x722da4g1p5
- x722da2
- ethernet_controller_e810
- x722da4g1p5_firmware
- x722da2_firmware
CWE
CWE-20
Improper Input Validation