6.6
MEDIUM
CVE-2021-0060
Intel SPS Hardware Compartmentalization Privilege Escalation Vulnerability
Description

Insufficient compartmentalization in HECI subsystem for the Intel(R) SPS before versions SPS_E5_04.01.04.516.0, SPS_E5_04.04.04.033.0, SPS_E5_04.04.03.281.0, SPS_E5_03.01.03.116.0, SPS_E3_05.01.04.309.0, SPS_02.04.00.101.0, SPS_SoC-A_05.00.03.114.0, SPS_SoC-X_04.00.04.326.0, SPS_SoC-X_03.00.03.117.0, IGN_E5_91.00.00.167.0, SPS_PHI_03.01.03.078.0 may allow an authenticated user to potentially enable escalation of privilege via physical access.

INFO

Published Date :

Feb. 9, 2022, 11:15 p.m.

Last Modified :

Nov. 21, 2024, 5:41 a.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

0.7
Affected Products

The following products are affected by CVE-2021-0060 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Intel server_platform_services_firmware
2 Intel atom_c3308
3 Intel atom_c3336
4 Intel atom_c3338
5 Intel atom_c3338r
6 Intel atom_c3436l
7 Intel atom_c3508
8 Intel atom_c3538
9 Intel atom_c3558
10 Intel atom_c3558r
11 Intel atom_c3708
12 Intel atom_c3750
13 Intel atom_c3758
14 Intel atom_c3758r
15 Intel atom_c3808
16 Intel atom_c3830
17 Intel atom_c3850
18 Intel atom_c3858
19 Intel atom_c3950
20 Intel atom_c3955
21 Intel atom_c3958
22 Intel atom_p5942b
23 Intel core_i3-1110g4
24 Intel core_i3-1115g4
25 Intel core_i3-1115g4e
26 Intel core_i3-1115gre
27 Intel core_i3-1120g4
28 Intel core_i3-1125g4
29 Intel core_i5-11260h
30 Intel core_i5-11300h
31 Intel core_i5-1130g7
32 Intel core_i5-11320h
33 Intel core_i5-1135g7
34 Intel core_i5-11400
35 Intel core_i5-11400f
36 Intel core_i5-11400h
37 Intel core_i5-11400t
38 Intel core_i5-1140g7
39 Intel core_i5-1145g7
40 Intel core_i5-1145g7e
41 Intel core_i5-1145gre
42 Intel core_i5-11500
43 Intel core_i5-11500h
44 Intel core_i5-11500t
45 Intel core_i5-1155g7
46 Intel core_i5-11600
47 Intel core_i5-11600k
48 Intel core_i5-11600kf
49 Intel core_i5-11600t
50 Intel core_i7-11370h
51 Intel core_i7-11375h
52 Intel core_i7-11390h
53 Intel core_i7-1160g7
54 Intel core_i7-1165g7
55 Intel core_i7-11700
56 Intel core_i7-11700f
57 Intel core_i7-11700k
58 Intel core_i7-11700kf
59 Intel core_i7-11700t
60 Intel core_i7-11800h
61 Intel core_i7-1180g7
62 Intel core_i7-11850h
63 Intel core_i7-1185g7
64 Intel core_i7-1185g7e
65 Intel core_i7-1185gre
66 Intel core_i7-1195g7
67 Intel core_i9-11900
68 Intel core_i9-11900f
69 Intel core_i9-11900h
70 Intel core_i9-11900k
71 Intel core_i9-11900kf
72 Intel core_i9-11900t
73 Intel core_i9-11950h
74 Intel core_i9-11980hk
75 Intel core_i5-11500he
76 Intel core_i7-11600h
77 Intel core_i7-11850he
78 Intel xeon_d-1513n
79 Intel xeon_d-1518
80 Intel xeon_d-1520
81 Intel xeon_d-1521
82 Intel xeon_d-1523n
83 Intel xeon_d-1527
84 Intel xeon_d-1528
85 Intel xeon_d-1529
86 Intel xeon_d-1531
87 Intel xeon_d-1533n
88 Intel xeon_d-1537
89 Intel xeon_d-1539
90 Intel xeon_d-1540
91 Intel xeon_d-1541
92 Intel xeon_d-1543n
93 Intel xeon_d-1548
94 Intel xeon_d-1553n
95 Intel xeon_d-1557
96 Intel xeon_d-1559
97 Intel xeon_d-1567
98 Intel xeon_d-1571
99 Intel xeon_d-1577
100 Intel xeon_d-2123it
101 Intel xeon_d-2141i
102 Intel xeon_d-2142it
103 Intel xeon_d-2143it
104 Intel xeon_d-2145nt
105 Intel xeon_d-2146nt
106 Intel xeon_d-2161i
107 Intel xeon_d-2163it
108 Intel xeon_d-2166nt
109 Intel xeon_d-2173it
110 Intel xeon_d-2177nt
111 Intel xeon_d-2183it
112 Intel xeon_d-2187nt
113 Intel xeon_w-1350
114 Intel xeon_w-1350p
115 Intel xeon_w-1370
116 Intel xeon_w-1370p
117 Intel xeon_w-1390
118 Intel xeon_w-1390p
119 Intel xeon_w-1390t
120 Intel pentium_gold_6405u
121 Intel core_i3-11100he
122 Intel c242
123 Intel c246
124 Intel c621
125 Intel c621a
126 Intel c622
127 Intel c624
128 Intel c625
129 Intel c626
130 Intel c627
131 Intel c627a
132 Intel c628
133 Intel c629
134 Intel c629a
135 Intel cm246
136 Intel pentium_gold_4417u
137 Intel pentium_gold_4425y
138 Intel pentium_gold_6500y
139 Intel pentium_gold_g5400
140 Intel pentium_gold_g5400t
141 Intel pentium_gold_g5420
142 Intel pentium_gold_g5420t
143 Intel pentium_gold_g6500
144 Intel pentium_gold_g6500t
145 Intel pentium_gold_g6505
146 Intel pentium_gold_g6505t
147 Intel atom_p5921b
148 Intel atom_p5931b
149 Intel atom_p5962b
150 Intel celeron_6305
151 Intel celeron_6305e
152 Intel celeron_6600he
153 Intel pentium_gold_7505
154 Intel pentium_gold_g6400
155 Intel pentium_gold_g6400t
156 Intel pentium_gold_g6405
157 Intel pentium_gold_g6405t
158 Intel pentium_gold_g6600
159 Intel pentium_gold_g6605
160 Intel pentium_gold_g7400
161 Intel pentium_gold_g7400t
162 Intel c620a_series_firmware
163 Intel c620_series_firmware
164 Intel c240_series_firmware
165 Intel atom_p5000_series_firmware
166 Intel atom_c3000_series_firmware
167 Intel atom_c610_series_firmware
168 Intel xeon_d-1500_series_firmware
169 Intel xeon_d_2000_series_firmware
170 Intel 11th_generation_core_series_firmware
171 Intel xeon_w-1300_series_firmware
172 Intel pentium_gold_series_firmware
173 Intel celeron_6000_series_firmware
174 Intel pentium_gold_4410y
175 Intel pentium_gold_4415u
176 Intel pentium_gold_4415y
177 Intel pentium_gold_5405u
178 Intel pentium_gold_g5500
179 Intel pentium_gold_g5500t
180 Intel pentium_gold_g5600
181 Intel pentium_gold_g5600t
182 Intel pentium_gold_g5620
183 Intel pentium_gold_g6400e
184 Intel pentium_gold_g6400te
185 Intel pentium_gold_g7400e
186 Intel pentium_gold_g7400te
187 Intel atom_c612
1 Netapp cloud_backup
2 Netapp hci_compute_node_bios
3 Netapp hci_storage_node_bios
4 Netapp solidfire_bios
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2021-0060.

URL Resource
https://security.netapp.com/advisory/ntap-20220210-0005/ Third Party Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html Vendor Advisory
https://security.netapp.com/advisory/ntap-20220210-0005/ Third Party Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-0060 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-0060 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://security.netapp.com/advisory/ntap-20220210-0005/
    Added Reference https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CWE Remap by [email protected]

    Jul. 12, 2022

    Action Type Old Value New Value
    Changed CWE CWE-269 NVD-CWE-Other
  • Initial Analysis by [email protected]

    Feb. 19, 2022

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:L/AC:L/Au:N/C:C/I:C/A:C)
    Added CVSS V3.1 NIST AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://security.netapp.com/advisory/ntap-20220210-0005/ No Types Assigned https://security.netapp.com/advisory/ntap-20220210-0005/ Third Party Advisory
    Changed Reference Type https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html No Types Assigned https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00470.html Vendor Advisory
    Added CWE NIST CWE-269
    Added CPE Configuration AND OR *cpe:2.3:o:intel:c620a_series_firmware:*:*:*:*:*:*:*:* versions up to (excluding) sps_e5_04.04.03.281.0 OR cpe:2.3:h:intel:c621a:-:*:*:*:*:*:*:* cpe:2.3:h:intel:c627a:-:*:*:*:*:*:*:* cpe:2.3:h:intel:c629a:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:c620_series_firmware:*:*:*:*:*:*:*:* versions up to (excluding) sps_e5_04.01.04.516.0 OR cpe:2.3:h:intel:c621:-:*:*:*:*:*:*:* cpe:2.3:h:intel:c622:-:*:*:*:*:*:*:* cpe:2.3:h:intel:c624:-:*:*:*:*:*:*:* cpe:2.3:h:intel:c625:-:*:*:*:*:*:*:* cpe:2.3:h:intel:c626:-:*:*:*:*:*:*:* cpe:2.3:h:intel:c627:-:*:*:*:*:*:*:* cpe:2.3:h:intel:c628:-:*:*:*:*:*:*:* cpe:2.3:h:intel:c629:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:c240_series_firmware:*:*:*:*:*:*:*:* versions up to (excluding) sps_e3_05.01.04.309.0 OR cpe:2.3:h:intel:c242:-:*:*:*:*:*:*:* cpe:2.3:h:intel:c246:-:*:*:*:*:*:*:* cpe:2.3:h:intel:cm246:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:atom_p5000_series_firmware:*:*:*:*:*:*:*:* versions up to (excluding) sps_soc-a_05.00.03.114.0 OR cpe:2.3:h:intel:atom_p5921b:*:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_p5931b:*:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_p5942b:*:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_p5962b:*:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:atom_c3000_series_firmware:*:*:*:*:*:*:*:* versions up to (excluding) sps_soc-a_04.00.04.501.0 OR cpe:2.3:h:intel:atom_c3308:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3336:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3338:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3338r:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3436l:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3508:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3538:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3558:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3558r:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3708:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3750:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3758:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3758r:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3808:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3830:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3850:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3858:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3950:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3955:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_c3958:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:atom_c610_series_firmware:*:*:*:*:*:*:*:* versions up to (excluding) sps_phi_03.01.03.078.0 OR cpe:2.3:h:intel:atom_c612:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:xeon_d-1500_series_firmware:*:*:*:*:*:*:*:* versions up to (excluding) sps_soc-x_03.00.03.117.0 OR cpe:2.3:h:intel:xeon_d-1513n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1518:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1520:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1521:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1523n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1527:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1528:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1529:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1531:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1533n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1537:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1539:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1540:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1541:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1543n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1548:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1553n:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1557:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1559:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1567:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1571:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-1577:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:xeon_d_2000_series_firmware:*:*:*:*:*:*:*:* versions up to (excluding) sps_phi_03.01.03.078.0 OR cpe:2.3:h:intel:xeon_d-2123it:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-2141i:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-2142it:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-2143it:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-2145nt:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-2146nt:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-2161i:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-2163it:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-2166nt:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-2173it:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-2177nt:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-2183it:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_d-2187nt:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:11th_generation_core_series_firmware:*:*:*:*:*:*:*:* versions up to (excluding) csme_15.0.35 OR cpe:2.3:h:intel:core_i3-11100he:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i3-1110g4:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i3-1115g4:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i3-1115g4e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i3-1115gre:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i3-1120g4:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i3-1125g4:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-11260h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-11300h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-1130g7:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-11320h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-1135g7:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-11400:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-11400f:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-11400h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-11400t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-1140g7:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-1145g7:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-1145g7e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-1145gre:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-11500:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-11500h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-11500he:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-11500t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-1155g7:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-11600:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-11600k:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-11600kf:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i5-11600t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-11370h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-11375h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-11390h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-11600h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-1160g7:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-1165g7:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-11700:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-11700f:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-11700k:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-11700kf:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-11700t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-11800h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-1180g7:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-11850h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-11850he:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-1185g7:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-1185g7e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-1185gre:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i7-1195g7:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i9-11900:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i9-11900f:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i9-11900h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i9-11900k:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i9-11900kf:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i9-11900t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i9-11950h:-:*:*:*:*:*:*:* cpe:2.3:h:intel:core_i9-11980hk:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:xeon_w-1300_series_firmware:*:*:*:*:*:*:*:* versions up to (excluding) csme_15.0.35 OR cpe:2.3:h:intel:xeon_w-1350:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_w-1350p:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_w-1370:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_w-1370p:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_w-1390:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_w-1390p:-:*:*:*:*:*:*:* cpe:2.3:h:intel:xeon_w-1390t:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_gold_series_firmware:*:*:*:*:*:*:*:* versions up to (excluding) csme_15.0.35 OR cpe:2.3:h:intel:pentium_gold_4410y:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_4415u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_4415y:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_4417u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_4425y:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_5405u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_6405u:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_6500y:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_7505:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g5400:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g5400t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g5420:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g5420t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g5500:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g5500t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g5600:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g5600t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g5620:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g6400:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g6400e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g6400t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g6400te:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g6405:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g6405t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g6500:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g6500t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g6505:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g6505t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g6600:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g6605:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g7400:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g7400e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g7400t:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_gold_g7400te:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_6000_series_firmware:*:*:*:*:*:*:*:* versions up to (excluding) csme_15.0.35 OR cpe:2.3:h:intel:celeron_6305:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_6305e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_6600he:-:*:*:*:*:*:*:*
    Added CPE Configuration OR *cpe:2.3:a:netapp:cloud_backup:-:*:*:*:*:*:*:* *cpe:2.3:o:netapp:hci_compute_node_bios:-:*:*:*:*:*:*:* *cpe:2.3:o:netapp:hci_storage_node_bios:-:*:*:*:*:*:*:* *cpe:2.3:o:netapp:solidfire_bios:-:*:*:*:*:*:*:*
  • CVE Modified by [email protected]

    Feb. 10, 2022

    Action Type Old Value New Value
    Added Reference https://security.netapp.com/advisory/ntap-20220210-0005/ [No Types Assigned]
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-0060 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2021-0060 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.04 }} 0.00%

score

0.10261

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability