#VU23542 Improper Check or Handling of Exceptional Conditions in Intel products - CVE-2019-11157
Published: December 11, 2019
Vulnerability identifier: #VU23542
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2019-11157
CWE-ID: CWE-703
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
6th Generation Intel Core Processors
7th Generation Intel Core Processors
8th Generation Intel Core Processors
10th Generation Intel Core Processors
Intel Xeon Processor E Family
Intel Xeon Processor E3 v5 Family
Intel Xeon Processor E3 v6 Family
Intel Xeon Processor E-2100 Family
Intel Xeon Processor E-2200 Family
Intel Celeron Processor G Series
9th Generation Intel Core Processors
6th Generation Intel Core Processors
7th Generation Intel Core Processors
8th Generation Intel Core Processors
10th Generation Intel Core Processors
Intel Xeon Processor E Family
Intel Xeon Processor E3 v5 Family
Intel Xeon Processor E3 v6 Family
Intel Xeon Processor E-2100 Family
Intel Xeon Processor E-2200 Family
Intel Celeron Processor G Series
9th Generation Intel Core Processors
Software vendor:
Intel
Intel
Description
The vulnerability allows a local user to escalate privileges on the target system.
The vulnerability exists due to improper conditions check in voltage settings. A local user can enable escalation of privilege and/or information disclosure on the target system.
Remediation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.