Protection mechanism failure in some Intel DCM software before version 5.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00902.html | Patch Vendor Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00902.html | Patch Vendor Advisory |
Configurations
History
21 Nov 2024, 08:01
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00902.html - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 10.0 |
25 Nov 2023, 02:27
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
First Time |
Intel data Center Manager
Intel |
|
CPE | cpe:2.3:a:intel:data_center_manager:*:*:*:*:*:*:*:* | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00902.html - Patch, Vendor Advisory | |
CWE | CWE-269 |
14 Nov 2023, 19:30
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-14 19:15
Updated : 2024-11-21 08:01
NVD link : CVE-2023-31273
Mitre link : CVE-2023-31273
CVE.ORG link : CVE-2023-31273
JSON object : View
Products Affected
intel
- data_center_manager