ID

VAR-201906-1231


CVE

CVE-2019-11124


TITLE

Intel Multiple vulnerabilities in the product

Trust: 0.8

sources: JVNDB: JVNDB-2019-004980

DESCRIPTION

Out of bound read/write in system firmware for Intel(R) NUC Kit may allow a privileged user to potentially enable escalation of privilege, denial of service and/or information disclosure via local access. IntelNUCKit is a small desktop computer from Intel Corporation of the United States. A buffer overflow vulnerability exists in the system firmware in IntelNUCKit. This vulnerability is caused when the network system or product performs operations on the memory and does not correctly verify the data boundary, resulting in incorrect read and write operations to other associated memory locations. This vulnerability can be exploited to cause buffer overflows or heap overflows. Multiple Intel NUC Kits are prone to multiple unspecified security vulnerabilities. Attackers can leverage these issues to gain elevated privileges, cause denial-of-service conditions or obtain sensitive information

Trust: 1.89

sources: NVD: CVE-2019-11124 // CNVD: CNVD-2019-25504 // BID: 108766 // VULHUB: VHN-142739 // VULMON: CVE-2019-11124

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-25504

AFFECTED PRODUCTS

vendor:intelmodel:compute cardscope:eqversion: -

Trust: 1.0

vendor:intelmodel:nuc kitscope:eqversion: -

Trust: 1.0

vendor:intelmodel:compute stickscope:eqversion: -

Trust: 1.0

vendor:intelmodel:accelerated storage managerscope: - version: -

Trust: 0.8

vendor:intelmodel:chipset device softwarescope: - version: -

Trust: 0.8

vendor:intelmodel:compute cardscope: - version: -

Trust: 0.8

vendor:intelmodel:compute stickscope: - version: -

Trust: 0.8

vendor:intelmodel:core i3scope: - version: -

Trust: 0.8

vendor:intelmodel:core i5scope: - version: -

Trust: 0.8

vendor:intelmodel:core x-seriesscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kitscope: - version: -

Trust: 0.8

vendor:intelmodel:omni-path fabric manager guiscope: - version: -

Trust: 0.8

vendor:intelmodel:pentiumscope:eqversion:processor 2000 series

Trust: 0.8

vendor:intelmodel:pentiumscope:eqversion:processor 3000 series

Trust: 0.8

vendor:intelmodel:pentiumscope:eqversion:processor g series

Trust: 0.8

vendor:intelmodel:proset/wireless software driverscope: - version: -

Trust: 0.8

vendor:intelmodel:raid web console v3scope:eqversion:for windows

Trust: 0.8

vendor:intelmodel:sgx dcap linux driverscope: - version: -

Trust: 0.8

vendor:intelmodel:sgx linux client driverscope: - version: -

Trust: 0.8

vendor:intelmodel:turbo boost max technologyscope: - version: -

Trust: 0.8

vendor:intelmodel:xeonscope:eqversion:processor e7 v3 family

Trust: 0.8

vendor:intelmodel:xeonscope:eqversion:processor e7 v5 family

Trust: 0.8

vendor:intelmodel:xeonscope:eqversion:processor e7 v7 family

Trust: 0.8

vendor:intelmodel:ite tech* consumer infrared driverscope:eqversion:for windows 10

Trust: 0.8

vendor:intelmodel:open cloud integrity technologyscope: - version: -

Trust: 0.8

vendor:intelmodel:openattestationscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kitsscope: - version: -

Trust: 0.6

vendor:intelmodel:nuc kitnuc6cayx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i7hvk biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i7hnk biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i7bex biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i5bex biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i3cyx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i3bex biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7pjy biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i7dnx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i7bnx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i5dnx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i5bnx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i3dnx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i3bnx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc7cjy biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc6i7kyk biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc6i5syx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc6i3syx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5ppyh biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5pgyh biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i7ryx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i5ryx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i5myx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i3ryx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i3myx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit nuc5cpyh biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit dn2820fykh biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit de3815tyb biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit d54250wyx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kit d34010wyx biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute stick stk2mv64cc biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute stick stk2m3w64cc biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute stick stk2m364cc biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute stick stck1a8lfc biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute stick stck1a32wfc biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute card cd1p64gk biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute card cd1m3128mk biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute card cd1iv128mk biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:compute card cd1c64gk biosscope:eqversion:0

Trust: 0.3

vendor:intelmodel:nuc kitnuc6cayx biosscope:neversion:0060

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i7hvk biosscope:neversion:0054

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i7hnk biosscope:neversion:0054

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i7bex biosscope:neversion:0071

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i5bex biosscope:neversion:0071

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i3cyx biosscope:neversion:0040

Trust: 0.3

vendor:intelmodel:nuc kit nuc8i3bex biosscope:neversion:0071

Trust: 0.3

vendor:intelmodel:nuc kit nuc7pjy biosscope:neversion:0049

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i7dnx biosscope:neversion:0063

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i7bnx biosscope:neversion:0079

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i5dnx biosscope:neversion:0063

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i5bnx biosscope:neversion:0079

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i3dnx biosscope:neversion:0063

Trust: 0.3

vendor:intelmodel:nuc kit nuc7i3bnx biosscope:neversion:0079

Trust: 0.3

vendor:intelmodel:nuc kit nuc7cjy biosscope:neversion:0049

Trust: 0.3

vendor:intelmodel:nuc kit nuc6i7kyk biosscope:neversion:0062

Trust: 0.3

vendor:intelmodel:nuc kit nuc6i5syx biosscope:neversion:0070

Trust: 0.3

vendor:intelmodel:nuc kit nuc6i3syx biosscope:neversion:0070

Trust: 0.3

vendor:intelmodel:nuc kit nuc5ppyh biosscope:neversion:0076

Trust: 0.3

vendor:intelmodel:nuc kit nuc5pgyh biosscope:neversion:0076

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i7ryx biosscope:neversion:0379

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i5ryx biosscope:neversion:0379

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i5myx biosscope:neversion:0051

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i3ryx biosscope:neversion:0379

Trust: 0.3

vendor:intelmodel:nuc kit nuc5i3myx biosscope:neversion:0054

Trust: 0.3

vendor:intelmodel:nuc kit nuc5cpyh biosscope:neversion:0076

Trust: 0.3

vendor:intelmodel:nuc kit dn2820fykh biosscope:neversion:0067

Trust: 0.3

vendor:intelmodel:nuc kit de3815tyb biosscope:neversion:0065

Trust: 0.3

vendor:intelmodel:nuc kit de3815tyb biosscope:neversion:0020

Trust: 0.3

vendor:intelmodel:nuc kit d54250wyx biosscope:neversion:0051

Trust: 0.3

vendor:intelmodel:nuc kit d34010wyx biosscope:neversion:0051

Trust: 0.3

vendor:intelmodel:compute stick stk2mv64cc biosscope:neversion:0060

Trust: 0.3

vendor:intelmodel:compute stick stk2m3w64cc biosscope:neversion:0060

Trust: 0.3

vendor:intelmodel:compute stick stk2m364cc biosscope:neversion:0060

Trust: 0.3

vendor:intelmodel:compute stick stck1a8lfc biosscope:neversion:0039

Trust: 0.3

vendor:intelmodel:compute stick stck1a32wfc biosscope:neversion:0039

Trust: 0.3

vendor:intelmodel:compute card cd1p64gk biosscope:neversion:0050

Trust: 0.3

vendor:intelmodel:compute card cd1m3128mk biosscope:neversion:0056

Trust: 0.3

vendor:intelmodel:compute card cd1iv128mk biosscope:neversion:0036

Trust: 0.3

vendor:intelmodel:compute card cd1c64gk biosscope:neversion:0050

Trust: 0.3

sources: CNVD: CNVD-2019-25504 // BID: 108766 // JVNDB: JVNDB-2019-004980 // NVD: CVE-2019-11124

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-11124
value: MEDIUM

Trust: 1.0

CNVD: CNVD-2019-25504
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201906-555
value: MEDIUM

Trust: 0.6

VULHUB: VHN-142739
value: MEDIUM

Trust: 0.1

VULMON: CVE-2019-11124
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-11124
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

CNVD: CNVD-2019-25504
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-142739
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-11124
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2019-25504 // VULHUB: VHN-142739 // VULMON: CVE-2019-11124 // CNNVD: CNNVD-201906-555 // NVD: CVE-2019-11124

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.1

problemtype:CWE-787

Trust: 1.1

sources: VULHUB: VHN-142739 // NVD: CVE-2019-11124

THREAT TYPE

local

Trust: 0.9

sources: BID: 108766 // CNNVD: CNNVD-201906-555

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201906-555

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004980

PATCH

title:[INTEL-SA-00248] Open Cloud Integrity Technology and OpenAttestation Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00248.html

Trust: 0.8

title:[INTEL-SA-00257] Intel Omni-Path Fabric Manager GUI Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00257.html

Trust: 0.8

title:[INTEL-SA-00259] Intel RAID Web Console 3 for Windows* Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00259.html

Trust: 0.8

title:[INTEL-SA-00224] Intel Chipset Device Software (INF Update Utility) Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00224.html

Trust: 0.8

title:[INTEL-SA-00264] Intel NUC Firmware Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html

Trust: 0.8

title:[INTEL-SA-00226] Intel Accelerated Storage Manager in Intel Rapid Storage Technology Enterprise Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00226.html

Trust: 0.8

title:[INTEL-SA-00206] ITE Tech* Consumer Infrared Driver for Windows 10 Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00206.html

Trust: 0.8

title:[INTEL-SA-00232] Intel PROSet/Wireless WiFi Software Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00232.html

Trust: 0.8

title:[INTEL-SA-00235] Intel SGX for Linux Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00235.html

Trust: 0.8

title:[INTEL-SA-00243] Intel Turbo Boost Max Technology 3.0 Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00243.html

Trust: 0.8

title:[INTEL-SA-00247] Partial Physical Address Leakage Advisoryurl:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00247.html

Trust: 0.8

title:IntelNUCKit Buffer Overflow Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/172797

Trust: 0.6

title:Intel NUC Kit Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=93788

Trust: 0.6

title:Threatposturl:https://threatpost.com/intel-patches-nuc-firmware/145620/

Trust: 0.1

sources: CNVD: CNVD-2019-25504 // VULMON: CVE-2019-11124 // JVNDB: JVNDB-2019-004980 // CNNVD: CNNVD-201906-555

EXTERNAL IDS

db:NVDid:CVE-2019-11124

Trust: 3.5

db:BIDid:108766

Trust: 2.7

db:JVNid:JVNVU95572531

Trust: 0.8

db:JVNDBid:JVNDB-2019-004980

Trust: 0.8

db:CNNVDid:CNNVD-201906-555

Trust: 0.7

db:CNVDid:CNVD-2019-25504

Trust: 0.6

db:AUSCERTid:ESB-2019.2099

Trust: 0.6

db:VULHUBid:VHN-142739

Trust: 0.1

db:VULMONid:CVE-2019-11124

Trust: 0.1

sources: CNVD: CNVD-2019-25504 // VULHUB: VHN-142739 // VULMON: CVE-2019-11124 // BID: 108766 // JVNDB: JVNDB-2019-004980 // CNNVD: CNNVD-201906-555 // NVD: CVE-2019-11124

REFERENCES

url:http://www.securityfocus.com/bid/108766

Trust: 3.1

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html

Trust: 2.7

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00264.html?wapkw=2019-11129

Trust: 2.3

url:https://nvd.nist.gov/vuln/detail/cve-2019-11124

Trust: 1.4

url:http://www.intel.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0130

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0179

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11123

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0136

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0180

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11124

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0157

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0181

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11125

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0164

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0182

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11126

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11127

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0174

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0183

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11128

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0175

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11092

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11129

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-3702

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0177

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11117

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0128

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-0178

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-11119

Trust: 0.8

url:http://jvn.jp/cert/jvnvu95572531

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0128

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0178

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11119

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0130

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0179

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11123

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0136

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0180

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0157

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0181

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11125

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0164

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0182

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11126

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0174

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0183

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11127

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0175

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11092

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11128

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-3702

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-0177

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11117

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2019-11129

Trust: 0.8

url:https://www.intel.com/content/www/us/en/security-center/advisory/in

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.2099/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/125.html

Trust: 0.1

url:https://cwe.mitre.org/data/definitions/787.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/intel-patches-nuc-firmware/145620/

Trust: 0.1

sources: CNVD: CNVD-2019-25504 // VULHUB: VHN-142739 // VULMON: CVE-2019-11124 // BID: 108766 // JVNDB: JVNDB-2019-004980 // CNNVD: CNNVD-201906-555 // NVD: CVE-2019-11124

CREDITS

and Malyutin Maksim.,Alexander Ermolov ,Ruslan Zakirov

Trust: 0.6

sources: CNNVD: CNNVD-201906-555

SOURCES

db:CNVDid:CNVD-2019-25504
db:VULHUBid:VHN-142739
db:VULMONid:CVE-2019-11124
db:BIDid:108766
db:JVNDBid:JVNDB-2019-004980
db:CNNVDid:CNNVD-201906-555
db:NVDid:CVE-2019-11124

LAST UPDATE DATE

2024-11-23T20:43:43.088000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-25504date:2019-08-02T00:00:00
db:VULHUBid:VHN-142739date:2019-06-24T00:00:00
db:VULMONid:CVE-2019-11124date:2019-06-24T00:00:00
db:BIDid:108766date:2019-06-11T00:00:00
db:JVNDBid:JVNDB-2019-004980date:2019-06-13T00:00:00
db:CNNVDid:CNNVD-201906-555date:2019-06-19T00:00:00
db:NVDid:CVE-2019-11124date:2024-11-21T04:20:34.530

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-25504date:2019-08-02T00:00:00
db:VULHUBid:VHN-142739date:2019-06-13T00:00:00
db:VULMONid:CVE-2019-11124date:2019-06-13T00:00:00
db:BIDid:108766date:2019-06-11T00:00:00
db:JVNDBid:JVNDB-2019-004980date:2019-06-13T00:00:00
db:CNNVDid:CNNVD-201906-555date:2019-06-13T00:00:00
db:NVDid:CVE-2019-11124date:2019-06-13T16:29:01.387