Vulnerabilities (CVE)

Filtered by vendor Intel Subscribe
Filtered by product Stk2m3w64cc
Total 7 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2017-5691 1 Intel 44 Lr1304spcfg1, Lr1304spcfg1 Bios, Lr1304spcfg1r and 41 more 2025-04-20 9.3 HIGH 9.0 CRITICAL
Incorrect check in Intel processors from 6th and 7th Generation Intel Core Processor Families, Intel Xeon E3-1500M v5 and v6 Product Families, and Intel Xeon E3-1200 v5 and v6 Product Families allows compromised system firmware to impact SGX security via incorrect early system state.
CVE-2016-8103 1 Intel 19 Canyon Bios, Citry Bios, City Bios and 16 more 2025-04-12 6.8 MEDIUM 6.7 MEDIUM
SMM call out in all Intel Branded NUC Kits allows a local privileged user to access the System Management Mode and take full control of the platform.
CVE-2019-14612 1 Intel 38 Cd1iv128mk, Cd1iv128mk Firmware, Cd1m3128mk and 35 more 2024-11-21 4.6 MEDIUM 6.7 MEDIUM
Out of bounds write in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2019-14611 1 Intel 38 Cd1iv128mk, Cd1iv128mk Firmware, Cd1m3128mk and 35 more 2024-11-21 4.6 MEDIUM 6.7 MEDIUM
Integer overflow in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2019-14610 1 Intel 38 Cd1iv128mk, Cd1iv128mk Firmware, Cd1m3128mk and 35 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Improper access control in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access.
CVE-2019-14609 1 Intel 38 Cd1iv128mk, Cd1iv128mk Firmware, Cd1m3128mk and 35 more 2024-11-21 4.6 MEDIUM 6.7 MEDIUM
Improper input validation in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
CVE-2019-14608 1 Intel 38 Cd1iv128mk, Cd1iv128mk Firmware, Cd1m3128mk and 35 more 2024-11-21 4.6 MEDIUM 7.8 HIGH
Improper buffer restrictions in firmware for Intel(R) NUC(R) may allow an authenticated user to potentially enable escalation of privilege via local access.