{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-08T04:56:14.710","vulnerabilities":[{"cve":{"id":"CVE-2019-11163","sourceIdentifier":"secure@intel.com","published":"2019-08-19T17:15:11.730","lastModified":"2024-11-21T04:20:38.970","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Insufficient access control in a hardware abstraction driver for Intel(R) Processor Identification Utility for Windows before version 6.1.0731 may allow an authenticated user to potentially enable escalation of privilege, denial of service or information disclosure via local access."},{"lang":"es","value":"Un control de acceso insuficiente en un controlador de abstracción de hardware para Intel® Processor Identification Utility para Windows versiones anteriores a  6.1.0731, puede permitir a un usuario autenticado habilitar potencialmente la escalada de privilegios, la denegación de servicio o la divulgación de información por medio del acceso local."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:intel:processor_identification_utility:*:*:*:*:*:windows:*:*","versionEndExcluding":"6.1.0731","matchCriteriaId":"29E16F11-E47B-430F-8CC4-007C6537A408"}]}]}],"references":[{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00281.html","source":"secure@intel.com","tags":["Patch","Vendor Advisory"]},{"url":"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00281.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}