Summary
| Detail | |||
|---|---|---|---|
| Vendor | Intel | First view | 2018-01-04 |
| Product | Xeon Gold 6130f | Last view | 2022-02-09 |
| Version | Type | Hardware | |
| Update | |||
| Edition | |||
| Language | |||
| Sofware Edition | |||
| Target Software | |||
| Target Hardware | |||
| Other | |||
Activity : Overall
COMMON PLATFORM ENUMERATION: Repartition per Version
| CPE Name | Affected CVE |
|---|---|
| cpe:2.3:h:intel:xeon_gold_6130f:-:*:*:*:*:*:*:* | 18 |
Related : CVE
| Date | Alert | Description | |
|---|---|---|---|
| 5.5 | 2022-02-09 | CVE-2021-0127 | Insufficient control flow management in some Intel(R) Processors may allow an authenticated user to potentially enable a denial of service via local access. |
| 6.7 | 2022-02-09 | CVE-2021-0115 | Buffer overflow in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. |
| 6.7 | 2022-02-09 | CVE-2021-0111 | NULL pointer dereference in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access. |
| 6.7 | 2022-02-09 | CVE-2021-0107 | Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable escalation of privilege via local access. |
| 6.7 | 2022-02-09 | CVE-2021-0103 | Insufficient control flow management in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access. |
| 7.8 | 2022-02-09 | CVE-2021-0099 | Insufficient control flow management in the firmware for some Intel(R) Processors may allow an authenticated user to potentially enable an escalation of privilege via local access. |
| 4.4 | 2022-02-09 | CVE-2021-0093 | Incorrect default permissions in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access. |
| 4.4 | 2022-02-09 | CVE-2021-0092 | Improper access control in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable a denial of service via local access. |
| 7.8 | 2022-02-09 | CVE-2021-0091 | Improper access control in the firmware for some Intel(R) Processors may allow an unauthenticated user to potentially enable an escalation of privilege via local access. |
| 6.7 | 2021-08-16 | CVE-2021-0114 | Unchecked return value in the firmware for some Intel(R) Processors may allow a privileged user to potentially enable an escalation of privilege via local access. |
| 6.7 | 2021-07-14 | CVE-2021-0144 | Insecure default variable initialization for the Intel BSSA DFT feature may allow a privileged user to potentially enable an escalation of privilege via local access. |
| 5.6 | 2020-03-12 | CVE-2020-0551 | Load value injection in some Intel(R) Processors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. The list of affected products is provided in intel-sa-00334: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00334.html |
| 5.6 | 2018-07-10 | CVE-2018-3693 | Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a speculative buffer overflow and side-channel analysis. |
| 7.6 | 2018-07-10 | CVE-2018-3652 | Existing UEFI setting restrictions for DCI (Direct Connect Interface) in 5th and 6th generation Intel Xeon Processor E3 Family, Intel Xeon Scalable processors, and Intel Xeon Processor D Family allows a limited physical presence attacker to potentially access platform secrets via debug interfaces. |
| 5.6 | 2018-03-27 | CVE-2018-9056 | Systems with microprocessors utilizing speculative execution may allow unauthorized disclosure of information to an attacker with local user access via a side-channel attack on the directional branch predictor, as demonstrated by a pattern history table (PHT), aka BranchScope. |
| 5.6 | 2018-01-04 | CVE-2017-5754 | Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis of the data cache. |
| 5.6 | 2018-01-04 | CVE-2017-5753 | Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. |
| 5.6 | 2018-01-04 | CVE-2017-5715 | Systems with microprocessors utilizing speculative execution and indirect branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis. |
CWE : Common Weakness Enumeration
| % | id | Name |
|---|---|---|
| 30% (3) | CWE-200 | Information Exposure |
| 20% (2) | CWE-203 | Information Exposure Through Discrepancy |
| 10% (1) | CWE-476 | NULL Pointer Dereference |
| 10% (1) | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
| 10% (1) | CWE-276 | Incorrect Default Permissions |
| 10% (1) | CWE-252 | Unchecked Return Value |
| 10% (1) | CWE-120 | Buffer Copy without Checking Size of Input ('Classic Buffer Overflo... |
Snort® IPS/IDS
| Date | Description |
|---|---|
| 2019-10-01 | Intel x64 side-channel analysis information leak attempt RuleID : 51330 - Type : OS-OTHER - Revision : 1 |
| 2019-10-01 | Intel x64 side-channel analysis information leak attempt RuleID : 51329 - Type : OS-OTHER - Revision : 1 |
| 2019-10-01 | Intel x64 side-channel analysis information leak attempt RuleID : 51328 - Type : OS-OTHER - Revision : 1 |
| 2019-10-01 | Intel x64 side-channel analysis information leak attempt RuleID : 51327 - Type : OS-OTHER - Revision : 1 |
| 2018-02-20 | Intel x64 side-channel analysis information leak attempt RuleID : 45444 - Type : OS-OTHER - Revision : 2 |
| 2018-02-20 | Intel x64 side-channel analysis information leak attempt RuleID : 45443 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x64 side-channel analysis information leak attempt RuleID : 45368 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x64 side-channel analysis information leak attempt RuleID : 45367 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45366 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45365 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45364 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45363 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45362 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45361 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45360 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45359 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45358 - Type : OS-OTHER - Revision : 2 |
| 2018-02-06 | Intel x86 side-channel analysis information leak attempt RuleID : 45357 - Type : OS-OTHER - Revision : 2 |
Nessus® Vulnerability Scanner
| id | Description |
|---|---|
| 2019-01-10 | Name: The remote device is affected by multiple vulnerabilities. File: juniper_space_jsa10917_184R1.nasl - Type: ACT_GATHER_INFO |
| 2018-11-02 | Name: The remote device is missing a vendor-supplied security patch. File: f5_bigip_SOL91229003.nasl - Type: ACT_GATHER_INFO |
| 2018-10-31 | Name: The remote Gentoo host is missing one or more security-related patches. File: gentoo_GLSA-201810-06.nasl - Type: ACT_GATHER_INFO |
| 2018-09-18 | Name: The remote EulerOS Virtualization host is missing multiple security updates. File: EulerOS_SA-2018-1236.nasl - Type: ACT_GATHER_INFO |
| 2018-09-18 | Name: The remote EulerOS Virtualization host is missing a security update. File: EulerOS_SA-2018-1233.nasl - Type: ACT_GATHER_INFO |
| 2018-09-17 | Name: The remote Debian host is missing a security update. File: debian_DLA-1506.nasl - Type: ACT_GATHER_INFO |
| 2018-09-07 | Name: The remote Debian host is missing a security update. File: debian_DLA-1497.nasl - Type: ACT_GATHER_INFO |
| 2018-08-31 | Name: The remote Virtuozzo host is missing multiple security updates. File: Virtuozzo_VZA-2018-063.nasl - Type: ACT_GATHER_INFO |
| 2018-08-20 | Name: The remote Virtuozzo host is missing multiple security updates. File: Virtuozzo_VZA-2018-055.nasl - Type: ACT_GATHER_INFO |
| 2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0097.nasl - Type: ACT_GATHER_INFO |
| 2018-08-17 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-1_0-0098.nasl - Type: ACT_GATHER_INFO |
| 2018-08-15 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-2390.nasl - Type: ACT_GATHER_INFO |
| 2018-08-15 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-2384.nasl - Type: ACT_GATHER_INFO |
| 2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0011.nasl - Type: ACT_GATHER_INFO |
| 2018-07-24 | Name: The remote PhotonOS host is missing multiple security updates. File: PhotonOS_PHSA-2018-2_0-0010.nasl - Type: ACT_GATHER_INFO |
| 2018-07-20 | Name: The remote Debian host is missing a security update. File: debian_DLA-1423.nasl - Type: ACT_GATHER_INFO |
| 2018-07-16 | Name: The remote Debian host is missing a security update. File: debian_DLA-1422.nasl - Type: ACT_GATHER_INFO |
| 2018-07-09 | Name: The remote Fedora host is missing a security update. File: fedora_2018-9f02e5ed7b.nasl - Type: ACT_GATHER_INFO |
| 2018-06-12 | Name: The remote Amazon Linux AMI host is missing a security update. File: ala_ALAS-2018-1038.nasl - Type: ACT_GATHER_INFO |
| 2018-06-12 | Name: The remote Amazon Linux 2 host is missing a security update. File: al2_ALAS-2018-1038.nasl - Type: ACT_GATHER_INFO |
| 2018-05-30 | Name: The remote Debian host is missing a security-related update. File: debian_DSA-4213.nasl - Type: ACT_GATHER_INFO |
| 2018-05-15 | Name: The remote Virtuozzo host is missing multiple security updates. File: Virtuozzo_VZA-2018-029.nasl - Type: ACT_GATHER_INFO |
| 2018-05-11 | Name: A server virtualization platform installed on the remote host is affected by ... File: citrix_xenserver_CTX234679.nasl - Type: ACT_GATHER_INFO |
| 2018-05-10 | Name: The remote CentOS host is missing one or more security updates. File: centos_RHSA-2018-1319.nasl - Type: ACT_GATHER_INFO |
| 2018-05-03 | Name: The remote Debian host is missing a security update. File: debian_DLA-1369.nasl - Type: ACT_GATHER_INFO |









