CVE-2021-0051
Published Jun 9, 2021
Last updated 3 years ago
Overview
- Description
- Improper input validation in the Intel(R) SPS versions before SPS_E5_04.04.04.023.0, SPS_E5_04.04.03.228.0 or SPS_SoC-A_05.00.03.098.0 may allow a privileged user to potentially enable denial of service via local access.
- Source
- secure@intel.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 4.4
- Impact score
- 3.6
- Exploitability score
- 0.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 2.1
- Impact score
- 2.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8B9B4AE9-72ED-43CB-9705-ED6BDD80AEC3" }, { "criteria": "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C51E9A02-E6FC-42AD-8269-07EFEFD2ADD4" }, { "criteria": "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "92911979-A714-4643-AF03-64EDBD42DFF5" }, { "criteria": "cpe:2.3:h:intel:c624a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0A12BCD5-2400-4846-862C-C966F146A828" }, { "criteria": "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "79973EAB-9106-4417-88AF-8AC368E58050" }, { "criteria": "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FBB31B9D-05BC-4D0E-8CC8-52757131A6CF" }, { "criteria": "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C518A082-388F-4DDE-8FDF-FEA95FD69B49" }, { "criteria": "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2BBE62C7-76BD-4684-8CDE-68DBFF4E5280" }, { "criteria": "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CA2DAF1D-8994-491E-BD65-642C23778DB7" }, { "criteria": "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EF0DA068-0D77-4358-BDEE-572811836689" }, { "criteria": "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C8B0316B-1968-4502-955D-78E9BDC2E30C" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:server_platform_services:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E6CC4A2-A7CC-449F-BDA2-D62F2D577E81", "versionEndExcluding": "sps_e5_04.04.04.023.0" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8B9B4AE9-72ED-43CB-9705-ED6BDD80AEC3" }, { "criteria": "cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C51E9A02-E6FC-42AD-8269-07EFEFD2ADD4" }, { "criteria": "cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "92911979-A714-4643-AF03-64EDBD42DFF5" }, { "criteria": "cpe:2.3:h:intel:c624a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0A12BCD5-2400-4846-862C-C966F146A828" }, { "criteria": "cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "79973EAB-9106-4417-88AF-8AC368E58050" }, { "criteria": "cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FBB31B9D-05BC-4D0E-8CC8-52757131A6CF" }, { "criteria": "cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C518A082-388F-4DDE-8FDF-FEA95FD69B49" }, { "criteria": "cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2BBE62C7-76BD-4684-8CDE-68DBFF4E5280" }, { "criteria": "cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CA2DAF1D-8994-491E-BD65-642C23778DB7" }, { "criteria": "cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EF0DA068-0D77-4358-BDEE-572811836689" }, { "criteria": "cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C8B0316B-1968-4502-955D-78E9BDC2E30C" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:server_platform_services:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64DC7FD7-4E4D-4317-9FAE-3F277BA943AC", "versionEndExcluding": "sps_e5_04.04.03.228.0" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:atom_p5921b:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E6D6CEE1-25DF-43C5-AEBB-49585B64236A" }, { "criteria": "cpe:2.3:h:intel:atom_p5931b:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "31E2104F-0CE3-4B9D-88B3-35D982C36562" }, { "criteria": "cpe:2.3:h:intel:atom_p5942b:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9D860FEC-BA79-4FEE-A79C-88AA857358E4" }, { "criteria": "cpe:2.3:h:intel:atom_p5962b:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C2CEF8A6-2445-4B63-822D-81F6AC708D62" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:server_platform_services:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "16674EDC-54AE-40BB-AA45-4F9E586DC885", "versionEndExcluding": "sps_soc-a_05.00.03.098.0" } ], "operator": "OR" } ], "operator": "AND" } ]