Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required High
Scope Changed
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
Attack Vector Local
Attack Complexity High
Privileges Required High
Scope Changed
Confidentiality Impact None
Integrity Impact Low
Availability Impact High
User Interaction Required
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Partial
This CVE is not in the KEV list.
The EPSS score is 0.00117.
Key SSVC decision points have not yet been added.
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Intel
Subscribe
|
Xeon 3104
Subscribe
Xeon 3104 Firmware
Subscribe
Xeon 3106
Subscribe
Xeon 3106 Firmware
Subscribe
Xeon 4108
Subscribe
Xeon 4108 Firmware
Subscribe
Xeon 4109t
Subscribe
Xeon 4109t Firmware
Subscribe
Xeon 4110
Subscribe
Xeon 4110 Firmware
Subscribe
Xeon 4112
Subscribe
Xeon 4112 Firmware
Subscribe
Xeon 4114
Subscribe
Xeon 4114 Firmware
Subscribe
Xeon 4114t
Subscribe
Xeon 4114t Firmware
Subscribe
Xeon 4116
Subscribe
Xeon 4116 Firmware
Subscribe
Xeon 4116t
Subscribe
Xeon 4116t Firmware
Subscribe
Xeon 5115
Subscribe
Xeon 5115 Firmware
Subscribe
Xeon 5118
Subscribe
Xeon 5118 Firmware
Subscribe
Xeon 5119t
Subscribe
Xeon 5119t Firmware
Subscribe
Xeon 5120
Subscribe
Xeon 5120 Firmware
Subscribe
Xeon 5120t
Subscribe
Xeon 5120t Firmware
Subscribe
Xeon 5122
Subscribe
Xeon 5122 Firmware
Subscribe
Xeon 6126
Subscribe
Xeon 6126 Firmware
Subscribe
Xeon 6126f
Subscribe
Xeon 6126f Firmware
Subscribe
Xeon 6126t
Subscribe
Xeon 6126t Firmware
Subscribe
Xeon 6128
Subscribe
Xeon 6128 Firmware
Subscribe
Xeon 6130
Subscribe
Xeon 6130 Firmware
Subscribe
Xeon 6130f
Subscribe
Xeon 6130f Firmware
Subscribe
Xeon 6130t
Subscribe
Xeon 6130t Firmware
Subscribe
Xeon 6132
Subscribe
Xeon 6132 Firmware
Subscribe
Xeon 6134
Subscribe
Xeon 6134 Firmware
Subscribe
Xeon 6134m
Subscribe
Xeon 6134m Firmware
Subscribe
Xeon 6136
Subscribe
Xeon 6136 Firmware
Subscribe
Xeon 6138
Subscribe
Xeon 6138 Firmware
Subscribe
Xeon 6138f
Subscribe
Xeon 6138f Firmware
Subscribe
Xeon 6138t
Subscribe
Xeon 6138t Firmware
Subscribe
Xeon 6140
Subscribe
Xeon 6140 Firmware
Subscribe
Xeon 6140m
Subscribe
Xeon 6140m Firmware
Subscribe
Xeon 6142
Subscribe
Xeon 6142 Firmware
Subscribe
Xeon 6142f
Subscribe
Xeon 6142f Firmware
Subscribe
Xeon 6144
Subscribe
Xeon 6144 Firmware
Subscribe
Xeon 6146
Subscribe
Xeon 6146 Firmware
Subscribe
Xeon 6148
Subscribe
Xeon 6148 Firmware
Subscribe
Xeon 6148f
Subscribe
Xeon 6148f Firmware
Subscribe
Xeon 6150
Subscribe
Xeon 6150 Firmware
Subscribe
Xeon 6152
Subscribe
Xeon 6152 Firmware
Subscribe
Xeon 6154
Subscribe
Xeon 6154 Firmware
Subscribe
Xeon 8153
Subscribe
Xeon 8153 Firmware
Subscribe
Xeon 8156
Subscribe
Xeon 8156 Firmware
Subscribe
Xeon 8158
Subscribe
Xeon 8158 Firmware
Subscribe
Xeon 8160
Subscribe
Xeon 8160 Firmware
Subscribe
Xeon 8160f
Subscribe
Xeon 8160f Firmware
Subscribe
Xeon 8160m
Subscribe
Xeon 8160m Firmware
Subscribe
Xeon 8160t
Subscribe
Xeon 8160t Firmware
Subscribe
Xeon 8164
Subscribe
Xeon 8164 Firmware
Subscribe
Xeon 8168
Subscribe
Xeon 8168 Firmware
Subscribe
Xeon 8170
Subscribe
Xeon 8170 Firmware
Subscribe
Xeon 8170m
Subscribe
Xeon 8170m Firmware
Subscribe
Xeon 8176
Subscribe
Xeon 8176 Firmware
Subscribe
Xeon 8176f
Subscribe
Xeon 8176f Firmware
Subscribe
Xeon 8176m
Subscribe
Xeon 8176m Firmware
Subscribe
Xeon 8180
Subscribe
Xeon 8180 Firmware
Subscribe
Xeon 8180m
Subscribe
Xeon 8180m Firmware
Subscribe
|
|
Opensuse
Subscribe
|
Leap
Subscribe
|
|
Redhat
Subscribe
|
Enterprise Linux
Subscribe
|
Configuration 1 [-]
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
Configuration 34 [-]
| AND |
|
Configuration 35 [-]
| AND |
|
Configuration 36 [-]
| AND |
|
Configuration 37 [-]
| AND |
|
Configuration 38 [-]
| AND |
|
Configuration 39 [-]
| AND |
|
Configuration 40 [-]
| AND |
|
Configuration 41 [-]
| AND |
|
Configuration 42 [-]
| AND |
|
Configuration 43 [-]
| AND |
|
Configuration 44 [-]
| AND |
|
Configuration 45 [-]
| AND |
|
Configuration 46 [-]
| AND |
|
Configuration 47 [-]
| AND |
|
Configuration 48 [-]
| AND |
|
Configuration 49 [-]
| AND |
|
Configuration 50 [-]
| AND |
|
Configuration 51 [-]
| AND |
|
Configuration 52 [-]
| AND |
|
Configuration 53 [-]
| AND |
|
Configuration 54 [-]
| AND |
|
Configuration 55 [-]
| AND |
|
Configuration 56 [-]
| AND |
|
Configuration 57 [-]
| AND |
|
Configuration 58 [-]
| AND |
|
| Package | CPE | Advisory | Released Date |
|---|---|---|---|
| Red Hat Enterprise Linux 8 | |||
| microcode_ctl-4:20190618-1.20191112.1.el8_1 | cpe:/o:redhat:enterprise_linux:8 | RHEA-2019:3845 | 2019-11-12T00:00:00Z |
No data.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2051-1 | intel-microcode security update |
Debian DSA |
DSA-4565-1 | intel-microcode security update |
Debian DSA |
DSA-4565-2 | intel-microcode security update |
EUVD |
EUVD-2019-2843 | Improper conditions check in the voltage modulation interface for some Intel(R) Xeon(R) Scalable Processors may allow a privileged user to potentially enable denial of service via local access. |
Ubuntu USN |
USN-4182-1 | Intel Microcode update |
Ubuntu USN |
USN-4182-2 | Intel Microcode update |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 20 Mar 2025 05:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat enterprise Linux |
|
| CPEs | cpe:/o:redhat:enterprise_linux:8 | |
| Vendors & Products |
Redhat
Redhat enterprise Linux |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2024-08-04T22:48:08.917Z
Reserved: 2019-04-11T00:00:00
Link: CVE-2019-11139
No data.
Status : Modified
Published: 2019-11-14T19:15:13.190
Modified: 2024-11-21T04:20:36.767
Link: CVE-2019-11139
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Ubuntu USN