CVE-2019-11175

CVSS V2 Medium 5 CVSS V3 High 7.5
Description
Insufficient input validation in Intel(R) Baseboard Management Controller firmware may allow an unauthenticated user to potentially enable denial of service via network access.
Overview
  • CVE ID
  • CVE-2019-11175
  • Assigner
  • secure@intel.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2019-11-14T17:15:14
  • Last Modified Date
  • 2019-11-19T17:36:00
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:intel:baseboard_management_controller_firmware:*:*:*:*:*:*:*:* 1 OR 2.18
cpe:2.3:h:intel:bbs2600bpb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:bbs2600bpbr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:bbs2600bpq:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:bbs2600bpqr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:bbs2600bps:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:bbs2600bpsr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:bbs2600stb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:bbs2600stbr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:bbs2600stq:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:bbs2600stqr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bpb24rx:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bpblcr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bpbrx:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hpchns2600bpbr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hpchns2600bpqr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hpchns2600bpsr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hpcr1208wfqysr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hpcr1208wftysr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hpcr1304wf0ysr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hpcr1304wftysr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hpcr2208wf0zsr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hpcr2208wfqzsr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hpcr2208wftzsr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hpcr2208wftzsrx:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hpcr2224wftzsr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hpcr2308wftzsr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hpcr2312wf0npr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:hpcr2312wftzsr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2208wftzsrx:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s2600stbr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s2600stqr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s2600wf0r:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s2600wfqr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s2600wftr:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s9232wk1hlc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s9232wk2hac:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s9232wk2hlc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s9248wk1hlc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s9248wk2hac:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s9248wk2hlc:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:h:intel:s9256wk1hlc:-:*:*:*:*:*:*:* 0 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:L/Au:N/C:N/I:N/A:P
  • Access Vector
  • NETWORK
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • NONE
  • Integrity Impact
  • NONE
  • Availability Impact
  • PARTIAL
  • Base Score
  • 5
  • Severity
  • MEDIUM
  • Exploitability Score
  • 10
  • Impact Score
  • 2.9
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • Attack Vector
  • NETWORK
  • Attack Compatibility
  • LOW
  • Privileges Required
  • NONE
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • NONE
  • Availability Impact
  • HIGH
  • Base Score
  • 7.5
  • Base Severity
  • HIGH
  • Exploitability Score
  • 3.9
  • Impact Score
  • 3.6
References
History
Created Old Value New Value Data Type Notes
2022-05-10 16:59:05 Added to TrackCVE
2022-12-04 06:09:38 2019-11-14T17:15Z 2019-11-14T17:15:14 CVE Published Date updated
2022-12-04 06:09:38 2019-11-19T17:36:00 CVE Modified Date updated
2022-12-04 06:09:38 Analyzed Vulnerability Status updated