Vulnerability Details CVE-2021-0188
Return of pointer value outside of expected range in the BIOS firmware for some Intel(R) Processors may allow a privileged user to potentially enable aescalation of privilege via local access.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.001
EPSS Ranking 24.6%
CVSS Severity
CVSS v3 Score 7.8
CVSS v2 Score 7.2
Products affected by CVE-2021-0188
-
cpe:2.3:h:intel:xeon_e3-1220_v5:-
-
cpe:2.3:h:intel:xeon_e3-1220_v6:-
-
cpe:2.3:h:intel:xeon_e3-1225_v5:-
-
cpe:2.3:h:intel:xeon_e3-1225_v6:-
-
cpe:2.3:h:intel:xeon_e3-1230_v5:-
-
cpe:2.3:h:intel:xeon_e3-1230_v6:-
-
cpe:2.3:h:intel:xeon_e3-1235l_v5:-
-
cpe:2.3:h:intel:xeon_e3-1240_v5:-
-
cpe:2.3:h:intel:xeon_e3-1240_v6:-
-
cpe:2.3:h:intel:xeon_e3-1240l_v5:-
-
cpe:2.3:h:intel:xeon_e3-1245_v5:-
-
cpe:2.3:h:intel:xeon_e3-1245_v6:-
-
cpe:2.3:h:intel:xeon_e3-1260l_v5:-
-
cpe:2.3:h:intel:xeon_e3-1268l_v5:-
-
cpe:2.3:h:intel:xeon_e3-1270_v5:-
-
cpe:2.3:h:intel:xeon_e3-1270_v6:-
-
cpe:2.3:h:intel:xeon_e3-1275_v5:-
-
cpe:2.3:h:intel:xeon_e3-1275_v6:-
-
cpe:2.3:h:intel:xeon_e3-1280_v5:-
-
cpe:2.3:h:intel:xeon_e3-1280_v6:-
-
cpe:2.3:h:intel:xeon_e3-1285_v6:-
-
cpe:2.3:h:intel:xeon_e3-1501l_v6:-
-
cpe:2.3:h:intel:xeon_e3-1501m_v6:-
-
cpe:2.3:h:intel:xeon_e3-1505l_v5:-
-
cpe:2.3:h:intel:xeon_e3-1505l_v6:-
-
cpe:2.3:h:intel:xeon_e3-1505m_v5:-
-
cpe:2.3:h:intel:xeon_e3-1505m_v6:-
-
cpe:2.3:h:intel:xeon_e3-1515m_v5:-
-
cpe:2.3:h:intel:xeon_e3-1535m_v5:-
-
cpe:2.3:h:intel:xeon_e3-1535m_v6:-
-
cpe:2.3:h:intel:xeon_e3-1545m_v5:-
-
cpe:2.3:h:intel:xeon_e3-1558l_v5:-
-
cpe:2.3:h:intel:xeon_e3-1565l_v5:-
-
cpe:2.3:h:intel:xeon_e3-1575m_v5:-
-
cpe:2.3:h:intel:xeon_e3-1578l_v5:-
-
cpe:2.3:h:intel:xeon_e3-1585_v5:-
-
cpe:2.3:h:intel:xeon_e3-1585l_v5:-
-
cpe:2.3:o:intel:xeon_e3-1220_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1220_v6_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1225_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1225_v6_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1230_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1230_v6_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1235l_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1240_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1240_v6_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1240l_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1245_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1245_v6_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1260l_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1268l_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1270_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1270_v6_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1275_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1275_v6_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1280_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1280_v6_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1285_v6_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1501l_v6_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1501m_v6_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1505l_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1505l_v6_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1505m_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1505m_v6_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1515m_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1535m_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1535m_v6_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1545m_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1558l_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1565l_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1575m_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1578l_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1585_v5_firmware:-
-
cpe:2.3:o:intel:xeon_e3-1585l_v5_firmware:-