Insufficient control flow management in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 & 5000 Series Processors may allow an authenticated user to potentially enable denial of service via adjacent access.

Project Subscriptions

Vendors Products
Debian Linux Subscribe
Celeron 4205u Subscribe
Celeron 4305u Subscribe
Celeron 4305ue Subscribe
Celeron 5205u Subscribe
Celeron 5305u Subscribe
Core I3 8100 Subscribe
Core I3 8100f Subscribe
Core I3 8100t Subscribe
Core I3 8300 Subscribe
Core I3 8300t Subscribe
Core I3 8350k Subscribe
Core I3 9100 Subscribe
Core I3 9100f Subscribe
Core I3 9100t Subscribe
Core I3 9300 Subscribe
Core I3 9300t Subscribe
Core I3 9320 Subscribe
Core I3 9350k Subscribe
Core I3 9350kf Subscribe
Core I5 8400 Subscribe
Core I5 8400t Subscribe
Core I5 8500 Subscribe
Core I5 8500t Subscribe
Core I5 8600 Subscribe
Core I5 8600k Subscribe
Core I5 8600t Subscribe
Core I5 9400 Subscribe
Core I5 9400f Subscribe
Core I5 9400t Subscribe
Core I5 9500 Subscribe
Core I5 9500f Subscribe
Core I5 9500t Subscribe
Core I5 9600 Subscribe
Core I5 9600k Subscribe
Core I5 9600kf Subscribe
Core I5 9600t Subscribe
Core I7 1060g7 Subscribe
Core I7 1060ng7 Subscribe
Core I7 1065g7 Subscribe
Core I7 1068ng7 Subscribe
Core I7 8086k Subscribe
Core I7 8700 Subscribe
Core I7 8700k Subscribe
Core I7 8700t Subscribe
Core I7 9700 Subscribe
Core I7 9700f Subscribe
Core I7 9700k Subscribe
Core I7 9700kf Subscribe
Core I7 9700t Subscribe
Core I9 9900 Subscribe
Core I9 9900k Subscribe
Core I9 9900kf Subscribe
Core I9 9900ks Subscribe
Core I9 9900t Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2645-1 edk2 security update
EUVD EUVD EUVD-2019-5719 Insufficient control flow management in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 & 5000 Series Processors may allow an authenticated user to potentially enable denial of service via adjacent access.
Ubuntu USN Ubuntu USN USN-4349-1 EDK II vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 14 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.002}

epss

{'score': 0.0012}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: intel

Published:

Updated: 2024-08-05T00:19:41.348Z

Reserved: 2019-08-03T00:00:00

Link: CVE-2019-14558

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-05T14:15:12.857

Modified: 2024-11-21T04:26:57.720

Link: CVE-2019-14558

cve-icon Redhat

Severity : Moderate

Publid Date: 2020-02-16T00:00:00Z

Links: CVE-2019-14558 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses