Metrics
Affected Vendors & Products
Wed, 16 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Fri, 21 Mar 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat enterprise Linux
Redhat rhel Els |
|
| CPEs | cpe:/o:redhat:enterprise_linux:9 cpe:/o:redhat:rhel_aus:8.2 cpe:/o:redhat:rhel_aus:8.4 cpe:/o:redhat:rhel_e4s:8.4 cpe:/o:redhat:rhel_e4s:9.0 cpe:/o:redhat:rhel_els:7 cpe:/o:redhat:rhel_eus:8.8 cpe:/o:redhat:rhel_eus:9.2 cpe:/o:redhat:rhel_tus:8.4 |
|
| Vendors & Products |
Redhat enterprise Linux
Redhat rhel Els |
Thu, 20 Mar 2025 15:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Redhat
Redhat rhel Aus Redhat rhel E4s Redhat rhel Eus Redhat rhel Tus |
|
| CPEs | cpe:/o:redhat:rhel_aus:7.7 cpe:/o:redhat:rhel_aus:8.6 cpe:/o:redhat:rhel_e4s:8.6 cpe:/o:redhat:rhel_eus:9.4 cpe:/o:redhat:rhel_tus:8.6 |
|
| Vendors & Products |
Redhat
Redhat rhel Aus Redhat rhel E4s Redhat rhel Eus Redhat rhel Tus |
Fri, 14 Feb 2025 01:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | microcode_ctl: Improper input validation in UEFI firmware | |
| References |
| |
| Metrics |
threat_severity
|
threat_severity
|
Thu, 13 Feb 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 12 Feb 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper input validation in UEFI firmware for some Intel(R) processors may allow a privileged user to potentially enable escalation of privilege via local access. | |
| Weaknesses | CWE-20 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: intel
Published: 2025-02-12T21:19:24.119Z
Updated: 2025-02-13T20:21:30.907Z
Reserved: 2023-10-25T03:00:09.595Z
Link: CVE-2023-43758
Updated: 2025-02-13T20:21:16.021Z
Status : Received
Published: 2025-02-12T22:15:30.153
Modified: 2025-02-12T22:15:30.153
Link: CVE-2023-43758