CVE-2020-0599: Vulnerability Analysis & Exploit Details

Status: Analyzed - Last modified: 30-11-2020 Published: 13-11-2020

CVE-2020-0599
Vulnerability Scoring

6.7
/10

Attack Complexity Details

  • Attack Complexity: Low Impact
  • Attack Vector: LOCAL
  • Privileges Required: HIGH IMPACT
  • Scope: UNCHANGED
  • User Interaction: NONE

CIA Impact Definition

  • Confidentiality: HIGH IMPACT
  • Integrity: HIGH IMPACT
  • Availability: HIGH IMPACT

CVE-2020-0599 Vulnerability Summary

Improper access control in the PMC for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access.

Access Complexity Graph for CVE-2020-0599

Impact Analysis for CVE-2020-0599

CVE-2020-0599: Detailed Information and External References

EPSS

0.00044

EPSS %

0.14911

References

0.00044

CWE

NVD-CWE-Other

Vulnerable Configurations

  • cpe:2.3:o:intel:pentium_j6425_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:pentium_j6425_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:pentium_j6425:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:pentium_j6425:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:pentium_j4205_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:pentium_j4205_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:pentium_j3710_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:pentium_j3710_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:pentium_j2900_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:pentium_j2900_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:pentium_j2850_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:pentium_j2850_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:pentium_n6415_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:pentium_n6415_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:pentium_n4200e_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:pentium_n4200e_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:pentium_n4200_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:pentium_n4200_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:pentium_n3540_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:pentium_n3540_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:pentium_n3530_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:pentium_n3530_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:pentium_n3520_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:pentium_n3520_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:pentium_n3510_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:pentium_n3510_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:pentium_n3700_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:pentium_n3700_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:pentium_n3710_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:pentium_n3710_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_j6413_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_j6413_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_j4125_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_j4125_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_j4105_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_j4105_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_j4025_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_j4025_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_j4005_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_j4005_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_j3455e_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_j3455e_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_j3355e_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_j3355e_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_j3455_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_j3455_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_j3355_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_j3355_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_j3160_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_j3160_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_j3060_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_j3060_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_j1900_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_j1900_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_j1850_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_j1850_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_j1800_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_j1800_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_j1750_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_j1750_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n6211_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n6211_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n4120_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n4120_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n4100_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n4100_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n4020_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n4020_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n4000_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n4000_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n3350e_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n3350e_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n3350_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n3350_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n3450_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n3450_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n3160_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n3160_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n3150_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n3150_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n3060_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n3060_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n3050_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n3050_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n3010_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n3010_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n3000_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n3000_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n2940_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n2940_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n2930_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n2930_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n2920_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n2920_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n2910_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n2910_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n2840_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n2840_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n2830_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n2830_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n2820_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n2820_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n2815_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n2815_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n2810_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n2810_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n2808_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n2808_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n2807_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n2807_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n2806_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n2806_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:celeron_n2805_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:celeron_n2805_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:atom_330_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:atom_330_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:atom_330:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:atom_330:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:atom_230_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:atom_230_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:atom_230:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:atom_230:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:atom_x5-e3930_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:atom_x5-e3930_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:atom_x5-e3940_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:atom_x5-e3940_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*
  • cpe:2.3:o:intel:atom_x7-e3950_firmware:-:*:*:*:*:*:*:*
    cpe:2.3:o:intel:atom_x7-e3950_firmware:-:*:*:*:*:*:*:*
  • cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*
    cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*

CVSS3 Source

nvd@nist.gov

CVSS3 Type

Primary

CVSS3 Vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

Protect Your Infrastructure: Combat Critical CVE Threats

Stay updated with real-time CVE vulnerabilities and take action to secure your systems. Enhance your cybersecurity posture with the latest threat intelligence and mitigation techniques. Develop the skills necessary to defend against CVEs and secure critical infrastructures. Join the top cybersecurity professionals safeguarding today's infrastructures.

Recently Published CVEs