Improper access control in the software installer for the Intel(R) Serial IO driver for Intel(R) NUC 11 Gen before version 30.100.2104.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00560.html | Vendor Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00560.html | Vendor Advisory |
Configurations
History
21 Nov 2024, 06:08
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00560.html - Vendor Advisory |
23 Nov 2021, 14:34
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00560.html - Vendor Advisory | |
CPE | cpe:2.3:a:intel:serial_io_driver_for_intel_nuc_11_gen:*:*:*:*:*:*:*:* | |
CWE | CWE-863 | |
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 7.8 |
17 Nov 2021, 20:17
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-11-17 20:15
Updated : 2024-11-21 06:08
NVD link : CVE-2021-33118
Mitre link : CVE-2021-33118
CVE.ORG link : CVE-2021-33118
JSON object : View
Products Affected
intel
- serial_io_driver_for_intel_nuc_11_gen
CWE