Attacker Value
Unknown
0
CVE-2021-33060
0
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-33060
(Last updated November 29, 2024) ▾
MITRE ATT&CK
Log in to add MITRE ATT&CK tag
Add MITRE ATT&CK tactics and techniques that apply to this CVE.
MITRE ATT&CK
Select the MITRE ATT&CK Tactics that apply to this CVE
Collection
Select any Techniques used:
Command and Control
Select any Techniques used:
Credential Access
Select any Techniques used:
Defense Evasion
Select any Techniques used:
Discovery
Select any Techniques used:
Execution
Select any Techniques used:
Exfiltration
Select any Techniques used:
Impact
Select any Techniques used:
Initial Access
Select any Techniques used:
Lateral Movement
Select any Techniques used:
Persistence
Select any Techniques used:
Privilege Escalation
Select any Techniques used:
Topic Tags
Select the tags that apply to this CVE (Assessment added tags are disabled and cannot be removed)
What makes this of high-value to an attacker?
What makes this of low-value to an attacker?
Description
Out-of-bounds write in the BIOS firmware for some Intel® Processors may allow an authenticated user to potentially enable escalation of privilege via local access.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
Data provided by the National Vulnerability Database (NVD)
Base Score:
7.8 High
Impact Score:
5.9
Exploitability Score:
1.8
Attack Vector (AV):
Local
Attack Complexity (AC):
Low
Privileges Required (PR):
Low
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High
General Information
Offensive Application
Unknown
Utility Class
Unknown
Ports
Unknown
OS
Unknown
Vulnerable Versions
Intel(R) Processors See references
Prerequisites
Unknown
Discovered By
Unknown
PoC Author
Unknown
Metasploit Module
Unknown
Reporter
Unknown
Products
- aff a200 firmware
- aff a220 firmware
- aff a250 firmware
- aff a300 firmware
- aff a320 firmware
- aff a400 firmware
- aff a700 firmware
- aff a700s firmware
- aff a800 firmware
- aff a900 firmware
- aff c190 firmware
- fas2600 firmware
- fas2700 firmware
- fas500f firmware
- fas8200 firmware
- fas8300 firmware
- fas8700 firmware
- fas9000 firmware
- fas9500 firmware
- xeon gold 5315y firmware
- xeon gold 5317 firmware
- xeon gold 5318h firmware
- xeon gold 5318n firmware
- xeon gold 5318s firmware
- xeon gold 5318y firmware
- xeon gold 5320 firmware
- xeon gold 5320h firmware
- xeon gold 5320t firmware
- xeon gold 6312u firmware
- xeon gold 6314u firmware
- xeon gold 6326 firmware
- xeon gold 6328h firmware
- xeon gold 6328hl firmware
- xeon gold 6330 firmware
- xeon gold 6330h firmware
- xeon gold 6330n firmware
- xeon gold 6334 firmware
- xeon gold 6336y firmware
- xeon gold 6338 firmware
- xeon gold 6338n firmware
- xeon gold 6338t firmware
- xeon gold 6342 firmware
- xeon gold 6346 firmware
- xeon gold 6348 firmware
- xeon gold 6348h firmware
- xeon gold 6354 firmware
- xeon platinum 8351n firmware
- xeon platinum 8352m firmware
- xeon platinum 8352s firmware
- xeon platinum 8352v firmware
- xeon platinum 8352y firmware
- xeon platinum 8353h firmware
- xeon platinum 8354h firmware
- xeon platinum 8356h firmware
- xeon platinum 8358 firmware
- xeon platinum 8358p firmware
- xeon platinum 8360h firmware
- xeon platinum 8360hl firmware
- xeon platinum 8360y firmware
- xeon platinum 8362 firmware
- xeon platinum 8368 firmware
- xeon platinum 8368q firmware
- xeon platinum 8376h firmware
- xeon platinum 8376hl firmware
- xeon platinum 8380 firmware
- xeon platinum 8380h firmware
- xeon platinum 8380hl firmware
- xeon silver 4309y firmware
- xeon silver 4310 firmware
- xeon silver 4310t firmware
- xeon silver 4314 firmware
- xeon silver 4316 firmware
References
Additional Info
Authenticated
Unknown
Exploitable
Unknown
Reliability
Unknown
Stability
Unknown
Available Mitigations
Unknown
Shelf Life
Unknown
Userbase/Installbase
Unknown
Patch Effectiveness
Unknown
Rapid7
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: