Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2018-3612

Intel NUC kits with insufficient input validation in system firmware, potentially allows a local attacker to elevate privileges to System Management Mode (SMM).
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 11.3%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 7.2
Products affected by CVE-2018-3612
  • Intel » Ayaplcel.86a » Version: N/A
    cpe:2.3:o:intel:ayaplcel.86a:-
  • Intel » Bios » Version: ayaplcel.86a
    cpe:2.3:o:intel:bios:ayaplcel.86a
  • Intel » Bios » Version: bnkbl357.86a
    cpe:2.3:o:intel:bios:bnkbl357.86a
  • Intel » Bios » Version: ccsklm30.86a
    cpe:2.3:o:intel:bios:ccsklm30.86a
  • Intel » Bios » Version: ccsklm5v.86a
    cpe:2.3:o:intel:bios:ccsklm5v.86a
  • Intel » Bios » Version: dnkbli30.86a
    cpe:2.3:o:intel:bios:dnkbli30.86a
  • Intel » Bios » Version: dnkbli5v.86a
    cpe:2.3:o:intel:bios:dnkbli5v.86a
  • Intel » Bios » Version: dnkbli7v.86a
    cpe:2.3:o:intel:bios:dnkbli7v.86a
  • Intel » Bios » Version: fybyt10h.86a
    cpe:2.3:o:intel:bios:fybyt10h.86a
  • Intel » Bios » Version: gkaplcpx.86a
    cpe:2.3:o:intel:bios:gkaplcpx.86a
  • Intel » Bios » Version: kyskli70.86a
    cpe:2.3:o:intel:bios:kyskli70.86a
  • Intel » Bios » Version: mkkbli5v.86a
    cpe:2.3:o:intel:bios:mkkbli5v.86a
  • Intel » Bios » Version: mkkbly35.86a
    cpe:2.3:o:intel:bios:mkkbly35.86a
  • Intel » Bios » Version: mybdwi30.86a
    cpe:2.3:o:intel:bios:mybdwi30.86a
  • Intel » Bios » Version: mybdwi5v.86a
    cpe:2.3:o:intel:bios:mybdwi5v.86a
  • Intel » Bios » Version: rybdwi35.86a
    cpe:2.3:o:intel:bios:rybdwi35.86a
  • Intel » Bios » Version: syskli35.86a
    cpe:2.3:o:intel:bios:syskli35.86a
  • Intel » Bios » Version: tybyt10h.86a
    cpe:2.3:o:intel:bios:tybyt10h.86a
  • Intel » Bnkbl357.86a » Version: N/A
    cpe:2.3:o:intel:bnkbl357.86a:-
  • Intel » Ccsklm30.86a » Version: N/A
    cpe:2.3:o:intel:ccsklm30.86a:-
  • Intel » Ccsklm5v.86a » Version: N/A
    cpe:2.3:o:intel:ccsklm5v.86a:-
  • Intel » Dnkbli30.86a » Version: N/A
    cpe:2.3:o:intel:dnkbli30.86a:-
  • Intel » Dnkbli5v.86a » Version: N/A
    cpe:2.3:o:intel:dnkbli5v.86a:-
  • Intel » Dnkbli7v.86a » Version: N/A
    cpe:2.3:o:intel:dnkbli7v.86a:-
  • Intel » Fybyt10h.86a » Version: N/A
    cpe:2.3:o:intel:fybyt10h.86a:-
  • Intel » Gkaplcpx.86a » Version: N/A
    cpe:2.3:o:intel:gkaplcpx.86a:-
  • Intel » Kyskli70.86a » Version: N/A
    cpe:2.3:o:intel:kyskli70.86a:-
  • Intel » Mkkbli5v.86a » Version: N/A
    cpe:2.3:o:intel:mkkbli5v.86a:-
  • Intel » Mkkbly35.86a » Version: N/A
    cpe:2.3:o:intel:mkkbly35.86a:-
  • Intel » Mybdwi30.86a » Version: N/A
    cpe:2.3:o:intel:mybdwi30.86a:-
  • Intel » Mybdwi5v.86a » Version: N/A
    cpe:2.3:o:intel:mybdwi5v.86a:-
  • Intel » Rybdwi35.86a » Version: N/A
    cpe:2.3:o:intel:rybdwi35.86a:-
  • Intel » Syskli35.86a » Version: N/A
    cpe:2.3:o:intel:syskli35.86a:-
  • Intel » Tybyt10h.86a » Version: N/A
    cpe:2.3:o:intel:tybyt10h.86a:-


Contact Us

Shodan ® - All rights reserved