Be in love with vulnerability scanning

Mageni is a powerful and easy vulnerability scanner used by companies of all sizes. You will be in love with Mageni's powerful features, ease of use and price. Free for 7-days then $39 monthly for infinite IPs.

Start now 

No Contracts, Cancel at Anytime and 7-days Money-Back Guarantee.

App screenshot

CVE-2021-0153

CVE information

Published

1 month ago

Last Modified

1 month ago

CVSSv2.0 Severity

High

CVSSv3.1 Severity

High

Impact Analysis

Description

Out-of-bounds write in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access..

CVSSv2.0 Score

Severity
High
Base Score
7.2/10
Exploit Score
3.9/10
Access Vector
Local
Access Complexity
Low
Authentication Required
None
Impact Score
10/10
Confidentiality Impact
Complete
Availability Impact
Complete
Integrity Impact
Complete

CVSSv3.1 Score

Severity
High
Base Score
7.8/10
Exploit Score
1.8/10
Access Vector
Local
Access Complexity
Low
Privileges Required
Low
Impact Score
5.9/10
Confidentiality Impact
High
Availability Impact
High
Integrity Impact
High
Scope
Unchanged
User Interaction
None

Products Affected

CPE Affected Vulnerable Excluding Edit
cpe:2.3:o:intel:core_i9-10900x_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:core_i9-10900x:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:core_i9-10920x_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:core_i9-10920x:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:core_i9-10940x_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:core_i9-10940x:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:core_i9-10980xe_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:core_i9-10980xe:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-1603_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-1603_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-1607_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-1607_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-1620_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-1620_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-1630_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-1630_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-1650_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-1650_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-1660_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-1660_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-1680_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-1680_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2603_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2603_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2608l_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2608l_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2609_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2609_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2618l_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2618l_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2620_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2620_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2623_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2623_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2628l_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2628l_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2630_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2630_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2630l_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2630l_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2637_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2637_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2640_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2640_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2643_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2643_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2648l_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2648l_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2650_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2650_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2650l_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2650l_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2658_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2658_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2660_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2660_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2667_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2667_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2679_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2679_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2680_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2680_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2683_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2683_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2687w_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2687w_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2689_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2689_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2690_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2690_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2695_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2695_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2697_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2697_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2697a_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2697a_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2698_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2698_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2699_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2699_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2699a_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2699a_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-2699r_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-2699r_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-4610_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-4610_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-4610a_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-4610a_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-4620_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-4620_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-4627_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-4627_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-4628l_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-4628l_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-4640_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-4640_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-4650_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-4650_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-4655_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-4655_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-4660_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-4660_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-4667_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-4667_v4:-:*:*:*:*:*:*:*
  No
-
cpe:2.3:o:intel:xeon_e5-4669_v4_firmware:-:*:*:*:*:*:*:*
  Yes
-
cpe:2.3:h:intel:xeon_e5-4669_v4:-:*:*:*:*:*:*:*
  No
-

Every 11 seconds there is a ransomware attack.

Mageni can help you manage this threat by understanding your vulnerabilities and prioritizing the remediation.

Sign up for free