Versio.io

CVE-2021-33120

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 10-02-2022 12:15
Last modified: - 15-02-2022 06:50
Total changes: - 3

Description

Out of bounds read under complex microarchitectural condition in memory subsystem for some Intel Atom(R) Processors may allow authenticated user to potentially enable information disclosure or cause denial of service via network access.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:L
Low
Attack complexity
Network
Attack vector
Low
Availability
Low
Confidentiality
None
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
5.4
Base score
2.8
2.5
Exploitability score
Impact score
 

Verification logic

OR
AND
OR
vendor=intel AND product=atom_p5942b_firmware AND version=-
OR
vendor=intel AND product=atom_p5942b AND version=-
AND
OR
vendor=intel AND product=atom_p5931b_firmware AND version=-
OR
vendor=intel AND product=atom_p5931b AND version=-
AND
OR
vendor=intel AND product=atom_p5962b_firmware AND version=-
OR
vendor=intel AND product=atom_p5962b AND version=-
AND
OR
vendor=intel AND product=atom_p5921b_firmware AND version=-
OR
vendor=intel AND product=atom_p5921b AND version=-
AND
OR
vendor=intel AND product=xeon_d1700_firmware AND version=-
OR
vendor=intel AND product=xeon_d1700 AND version=-
AND
OR
vendor=intel AND product=xeon_d2700_firmware AND version=-
OR
vendor=intel AND product=xeon_d2700 AND version=-
AND
OR
vendor=intel AND product=core_i5-l16g7_firmware AND version=-
OR
vendor=intel AND product=core_i5-l16g7 AND version=-
AND
OR
vendor=intel AND product=core_i3-l13g4_firmware AND version=-
OR
vendor=intel AND product=core_i3-l13g4 AND version=-
AND
OR
vendor=intel AND product=pentium_j6425_firmware AND version=-
OR
vendor=intel AND product=pentium_j6425 AND version=-
AND
OR
vendor=intel AND product=pentium_n6415_firmware AND version=-
OR
vendor=intel AND product=pentium_n6415 AND version=-
AND
OR
vendor=intel AND product=celeron_j6413_firmware AND version=-
OR
vendor=intel AND product=celeron_j6413 AND version=-
AND
OR
vendor=intel AND product=celeron_n6211_firmware AND version=-
OR
vendor=intel AND product=celeron_n6211 AND version=-
AND
OR
vendor=intel AND product=atom_x6413e_firmware AND version=-
OR
vendor=intel AND product=atom_x6413e AND version=-
AND
OR
vendor=intel AND product=atom_x6425re_firmware AND version=-
OR
vendor=intel AND product=atom_x6425re AND version=-
AND
OR
vendor=intel AND product=atom_x6427fe_firmware AND version=-
OR
vendor=intel AND product=atom_x6427fe AND version=-
AND
OR
vendor=intel AND product=atom_x6212re_firmware AND version=-
OR
vendor=intel AND product=atom_x6212re AND version=-
AND
OR
vendor=intel AND product=atom_x6200fe_firmware AND version=-
OR
vendor=intel AND product=atom_x6200fe AND version=-
AND
OR
vendor=intel AND product=atom_x6211e_firmware AND version=-
OR
vendor=intel AND product=atom_x6211e AND version=-
AND
OR
vendor=intel AND product=atom_x6425e_firmware AND version=-
OR
vendor=intel AND product=atom_x6425e AND version=-
AND
OR
vendor=intel AND product=pentium_silver_n6005_firmware AND version=-
OR
vendor=intel AND product=pentium_silver_n6005 AND version=-
AND
OR
vendor=intel AND product=pentium_silver_n6000_firmware AND version=-
OR
vendor=intel AND product=pentium_silver_n6000 AND version=-
AND
OR
vendor=intel AND product=celeron_n4505_firmware AND version=-
OR
vendor=intel AND product=celeron_n4505 AND version=-
AND
OR
vendor=intel AND product=celeron_n4500_firmware AND version=-
OR
vendor=intel AND product=celeron_n4500 AND version=-
AND
OR
vendor=intel AND product=celeron_n5105_firmware AND version=-
OR
vendor=intel AND product=celeron_n5105 AND version=-
AND
OR
vendor=intel AND product=celeron_n5100_firmware AND version=-
OR
vendor=intel AND product=celeron_n5100 AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2021-33120

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.