6.8
MEDIUM
CVE-2021-0146
Intel Test Logic Vulnerability - Physical Access Escalation
Description

Hardware allows activation of test or debug logic at runtime for some Intel(R) processors which may allow an unauthenticated user to potentially enable escalation of privilege via physical access.

INFO

Published Date :

Nov. 17, 2021, 8:15 p.m.

Last Modified :

Nov. 21, 2024, 5:42 a.m.

Remotely Exploitable :

No

Impact Score :

5.9

Exploitability Score :

0.9
Affected Products

The following products are affected by CVE-2021-0146 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Intel pentium_j4205_firmware
2 Intel pentium_n4200_firmware
3 Intel celeron_j3355_firmware
4 Intel celeron_j3455_firmware
5 Intel celeron_n3350_firmware
6 Intel celeron_n3450_firmware
7 Intel pentium_silver_j5005_firmware
8 Intel pentium_silver_n5000_firmware
9 Intel celeron_j4005_firmware
10 Intel celeron_j4105_firmware
11 Intel celeron_n4000_firmware
12 Intel celeron_n4100_firmware
13 Intel pentium_silver_j5040_firmware
14 Intel pentium_silver_n5030_firmware
15 Intel pentium_j3710_firmware
16 Intel pentium_n3540_firmware
17 Intel pentium_n3530_firmware
18 Intel celeron_j4125_firmware
19 Intel celeron_j4025_firmware
20 Intel celeron_j3355e_firmware
21 Intel celeron_j3160_firmware
22 Intel celeron_j3060_firmware
23 Intel celeron_j1900_firmware
24 Intel celeron_j1850_firmware
25 Intel celeron_j1800_firmware
26 Intel celeron_j1750_firmware
27 Intel celeron_n4120_firmware
28 Intel celeron_n4020_firmware
29 Intel celeron_n3350e_firmware
30 Intel celeron_n3160_firmware
31 Intel celeron_n3150_firmware
32 Intel celeron_n3060_firmware
33 Intel celeron_n3050_firmware
34 Intel celeron_n3010_firmware
35 Intel celeron_n3000_firmware
36 Intel celeron_n2940_firmware
37 Intel celeron_n2930_firmware
38 Intel celeron_n2920_firmware
39 Intel celeron_n2910_firmware
40 Intel celeron_n2840_firmware
41 Intel celeron_n2830_firmware
42 Intel celeron_n2820_firmware
43 Intel celeron_n2815_firmware
44 Intel celeron_n2810_firmware
45 Intel celeron_n2808_firmware
46 Intel celeron_n2807_firmware
47 Intel celeron_n2806_firmware
48 Intel celeron_n2805_firmware
49 Intel atom_x7-e3950_firmware
50 Intel atom_x5-e3940_firmware
51 Intel atom_x5-e3930_firmware
52 Intel celeron_j3355
53 Intel celeron_j3355e
54 Intel celeron_j3455
55 Intel celeron_j3455e
56 Intel celeron_j4005
57 Intel celeron_j4025
58 Intel celeron_j4105
59 Intel celeron_j4125
60 Intel celeron_j6413
61 Intel celeron_n3350
62 Intel celeron_n3350e
63 Intel celeron_n3450
64 Intel celeron_n4000
65 Intel celeron_n4020
66 Intel celeron_n4100
67 Intel celeron_n4120
68 Intel celeron_n6211
69 Intel pentium_j4205
70 Intel pentium_n4200
71 Intel pentium_n4200e
72 Intel pentium_n6415
73 Intel pentium_silver_j5005
74 Intel pentium_silver_j5040
75 Intel pentium_silver_n5000
76 Intel pentium_silver_n5030
77 Intel atom_x5-e3930
78 Intel atom_x5-e3940
79 Intel atom_x7-e3950
80 Intel celeron_j1750
81 Intel celeron_j1800
82 Intel celeron_j1850
83 Intel celeron_j1900
84 Intel celeron_j3060
85 Intel celeron_j3160
86 Intel celeron_j6412
87 Intel celeron_n2805
88 Intel celeron_n2806
89 Intel celeron_n2807
90 Intel celeron_n2808
91 Intel celeron_n2810
92 Intel celeron_n2815
93 Intel celeron_n2820
94 Intel celeron_n2830
95 Intel celeron_n2840
96 Intel celeron_n2910
97 Intel celeron_n2920
98 Intel celeron_n2930
99 Intel celeron_n2940
100 Intel celeron_n3000
101 Intel celeron_n3010
102 Intel celeron_n3050
103 Intel celeron_n3060
104 Intel celeron_n3150
105 Intel celeron_n3160
106 Intel celeron_n4500
107 Intel celeron_n4505
108 Intel celeron_n5100
109 Intel celeron_n5105
110 Intel celeron_n6210
111 Intel pentium_j2850
112 Intel pentium_j2900
113 Intel pentium_j3710
114 Intel pentium_j6426
115 Intel pentium_n3510
116 Intel pentium_n3520
117 Intel pentium_n3530
118 Intel pentium_n3540
119 Intel pentium_n3700
120 Intel pentium_n3710
121 Intel pentium_silver_n6000
122 Intel pentium_silver_n6005
123 Intel atom_c3000
124 Intel pentium_j6426_firmware
125 Intel pentium_j2900_firmware
126 Intel pentium_j2850_firmware
127 Intel pentium_n6415_firmware
128 Intel pentium_n4200e_firmware
129 Intel pentium_n3710_firmware
130 Intel pentium_n3700_firmware
131 Intel pentium_n3520_firmware
132 Intel pentium_n3510_firmware
133 Intel celeron_j6412_firmware
134 Intel celeron_j6413_firmware
135 Intel celeron_j3455e_firmware
136 Intel celeron_n6210_firmware
137 Intel celeron_n4500_firmware
138 Intel celeron_n4505_firmware
139 Intel celeron_n5100_firmware
140 Intel celeron_n5105_firmware
141 Intel celeron_n6211_firmware
142 Intel pentium_silver_n6000_firmware
143 Intel pentium_silver_n6005_firmware
144 Intel atom_c3000_firmware
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2021-0146.

URL Resource
https://security.netapp.com/advisory/ntap-20211210-0006/ Third Party Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html Vendor Advisory
https://security.netapp.com/advisory/ntap-20211210-0006/ Third Party Advisory
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-0146 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-0146 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://security.netapp.com/advisory/ntap-20211210-0006/
    Added Reference https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CWE Remap by [email protected]

    May. 03, 2022

    Action Type Old Value New Value
    Changed CWE CWE-269 NVD-CWE-OTHER
  • Modified Analysis by [email protected]

    Dec. 14, 2021

    Action Type Old Value New Value
    Changed Reference Type https://security.netapp.com/advisory/ntap-20211210-0006/ No Types Assigned https://security.netapp.com/advisory/ntap-20211210-0006/ Third Party Advisory
  • CVE Modified by [email protected]

    Dec. 10, 2021

    Action Type Old Value New Value
    Added Reference https://security.netapp.com/advisory/ntap-20211210-0006/ [No Types Assigned]
  • Initial Analysis by [email protected]

    Nov. 22, 2021

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:L/AC:L/Au:N/C:P/I:P/A:P)
    Added CVSS V3.1 NIST AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
    Changed Reference Type https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html No Types Assigned https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00528.html Vendor Advisory
    Added CWE NIST CWE-269
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_j6426_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_j4205_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_j3710_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_j2900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_j2850_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j6412_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j6413_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j4125_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j4025_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j3355e_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j3455e_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j4105_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j4005_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j3455_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j3355_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j3160_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j3060_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j1800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j1900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j1850_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_j1750_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n6210_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n4505_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n4500_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n5105_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n5100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n6211_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n4120_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n4020_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n3350e_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n4000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n4100_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n3350_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n3450_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n3060_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n3160_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n3010_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n3000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n3050_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n3150_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n2808_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n2840_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n2940_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n2807_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n2830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n2930_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n2806_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n2920_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n2820_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n2815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n2805_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n2810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:celeron_n2910_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:atom_x5-e3930_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:atom_x5-e3940_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:atom_x7-e3950_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_n6415_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_n4200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_n3710_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_n4200e_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_n3700_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_n3540_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_n3530_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_n3520_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_n3510_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_silver_n6005_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_silver_n6005:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_silver_n6000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_silver_n6000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_silver_j5040_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_silver_j5040:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_silver_n5030_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_silver_n5030:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_silver_j5005_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_silver_j5005:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:pentium_silver_n5000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:pentium_silver_n5000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:intel:atom_c3000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:intel:atom_c3000:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-0146 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2021-0146 weaknesses.

Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.07 }} 0.01%

score

0.31916

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability