Metrics
No CVSS v4.0
Attack Vector Local
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact High
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Complete
Integrity Impact Complete
Availability Impact Complete
This CVE is not in the KEV list.
The EPSS score is 0.0015.
Exploitation none
Automatable no
Technical Impact total
Affected Vendors & Products
| Vendors | Products |
|---|---|
|
Intel
Subscribe
|
Xeon E3-1220 V5
Subscribe
Xeon E3-1220 V5 Firmware
Subscribe
Xeon E3-1220 V6
Subscribe
Xeon E3-1220 V6 Firmware
Subscribe
Xeon E3-1225 V5
Subscribe
Xeon E3-1225 V5 Firmware
Subscribe
Xeon E3-1225 V6
Subscribe
Xeon E3-1225 V6 Firmware
Subscribe
Xeon E3-1230 V5
Subscribe
Xeon E3-1230 V5 Firmware
Subscribe
Xeon E3-1230 V6
Subscribe
Xeon E3-1230 V6 Firmware
Subscribe
Xeon E3-1235l V5
Subscribe
Xeon E3-1235l V5 Firmware
Subscribe
Xeon E3-1240 V5
Subscribe
Xeon E3-1240 V5 Firmware
Subscribe
Xeon E3-1240 V6
Subscribe
Xeon E3-1240 V6 Firmware
Subscribe
Xeon E3-1240l V5
Subscribe
Xeon E3-1240l V5 Firmware
Subscribe
Xeon E3-1245 V5
Subscribe
Xeon E3-1245 V5 Firmware
Subscribe
Xeon E3-1245 V6
Subscribe
Xeon E3-1245 V6 Firmware
Subscribe
Xeon E3-1260l V5
Subscribe
Xeon E3-1260l V5 Firmware
Subscribe
Xeon E3-1268l V5
Subscribe
Xeon E3-1268l V5 Firmware
Subscribe
Xeon E3-1270 V5
Subscribe
Xeon E3-1270 V5 Firmware
Subscribe
Xeon E3-1270 V6
Subscribe
Xeon E3-1270 V6 Firmware
Subscribe
Xeon E3-1275 V5
Subscribe
Xeon E3-1275 V5 Firmware
Subscribe
Xeon E3-1275 V6
Subscribe
Xeon E3-1275 V6 Firmware
Subscribe
Xeon E3-1280 V5
Subscribe
Xeon E3-1280 V5 Firmware
Subscribe
Xeon E3-1280 V6
Subscribe
Xeon E3-1280 V6 Firmware
Subscribe
Xeon E3-1285 V6
Subscribe
Xeon E3-1285 V6 Firmware
Subscribe
Xeon E3-1501l V6
Subscribe
Xeon E3-1501l V6 Firmware
Subscribe
Xeon E3-1501m V6
Subscribe
Xeon E3-1501m V6 Firmware
Subscribe
Xeon E3-1505l V5
Subscribe
Xeon E3-1505l V5 Firmware
Subscribe
Xeon E3-1505l V6
Subscribe
Xeon E3-1505l V6 Firmware
Subscribe
Xeon E3-1505m V5
Subscribe
Xeon E3-1505m V5 Firmware
Subscribe
Xeon E3-1505m V6
Subscribe
Xeon E3-1505m V6 Firmware
Subscribe
Xeon E3-1515m V5
Subscribe
Xeon E3-1515m V5 Firmware
Subscribe
Xeon E3-1535m V5
Subscribe
Xeon E3-1535m V5 Firmware
Subscribe
Xeon E3-1535m V6
Subscribe
Xeon E3-1535m V6 Firmware
Subscribe
Xeon E3-1545m V5
Subscribe
Xeon E3-1545m V5 Firmware
Subscribe
Xeon E3-1558l V5
Subscribe
Xeon E3-1558l V5 Firmware
Subscribe
Xeon E3-1565l V5
Subscribe
Xeon E3-1565l V5 Firmware
Subscribe
Xeon E3-1575m V5
Subscribe
Xeon E3-1575m V5 Firmware
Subscribe
Xeon E3-1578l V5
Subscribe
Xeon E3-1578l V5 Firmware
Subscribe
Xeon E3-1585 V5
Subscribe
Xeon E3-1585 V5 Firmware
Subscribe
Xeon E3-1585l V5
Subscribe
Xeon E3-1585l V5 Firmware
Subscribe
|
Configuration 1 [-]
| AND |
|
Configuration 2 [-]
| AND |
|
Configuration 3 [-]
| AND |
|
Configuration 4 [-]
| AND |
|
Configuration 5 [-]
| AND |
|
Configuration 6 [-]
| AND |
|
Configuration 7 [-]
| AND |
|
Configuration 8 [-]
| AND |
|
Configuration 9 [-]
| AND |
|
Configuration 10 [-]
| AND |
|
Configuration 11 [-]
| AND |
|
Configuration 12 [-]
| AND |
|
Configuration 13 [-]
| AND |
|
Configuration 14 [-]
| AND |
|
Configuration 15 [-]
| AND |
|
Configuration 16 [-]
| AND |
|
Configuration 17 [-]
| AND |
|
Configuration 18 [-]
| AND |
|
Configuration 19 [-]
| AND |
|
Configuration 20 [-]
| AND |
|
Configuration 21 [-]
| AND |
|
Configuration 22 [-]
| AND |
|
Configuration 23 [-]
| AND |
|
Configuration 24 [-]
| AND |
|
Configuration 25 [-]
| AND |
|
Configuration 26 [-]
| AND |
|
Configuration 27 [-]
| AND |
|
Configuration 28 [-]
| AND |
|
Configuration 29 [-]
| AND |
|
Configuration 30 [-]
| AND |
|
Configuration 31 [-]
| AND |
|
Configuration 32 [-]
| AND |
|
Configuration 33 [-]
| AND |
|
Configuration 34 [-]
| AND |
|
Configuration 35 [-]
| AND |
|
Configuration 36 [-]
| AND |
|
Configuration 37 [-]
| AND |
|
No data.
No data.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-2807 | Return of pointer value outside of expected range in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 05 May 2025 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: intel
Published:
Updated: 2025-05-05T16:55:51.881Z
Reserved: 2020-10-22T00:00:00.000Z
Link: CVE-2021-0188
Updated: 2024-08-03T15:32:10.033Z
Status : Modified
Published: 2022-05-12T17:15:08.597
Modified: 2025-05-05T17:16:55.893
Link: CVE-2021-0188
No data.
OpenCVE Enrichment
No data.
EUVD