CVE-2016-1493
Severity CVSS v4.0:
Pending analysis
Type:
CWE-345
Insufficient Verification of Data Authenticity
Publication date:
29/01/2016
Last modified:
12/04/2025
Description
Intel Driver Update Utility before 2.4 retrieves driver updates in cleartext, which makes it easier for man-in-the-middle attackers to execute arbitrary code via a crafted file.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
7.60
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:intel:driver_update_utility:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:driver_update_utility:2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:driver_update_utility:2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:intel:driver_update_utility:2.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/135314/Intel-Driver-Update-Utility-2.2.0.5-Man-In-The-Middle.html
- http://seclists.org/fulldisclosure/2016/Jan/56
- http://www.coresecurity.com/advisories/intel-driver-update-utility-mitm
- http://www.securityfocus.com/archive/1/537327/100/0/threaded
- https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00048&languageid=en-fr
- http://packetstormsecurity.com/files/135314/Intel-Driver-Update-Utility-2.2.0.5-Man-In-The-Middle.html
- http://seclists.org/fulldisclosure/2016/Jan/56
- http://www.coresecurity.com/advisories/intel-driver-update-utility-mitm
- http://www.securityfocus.com/archive/1/537327/100/0/threaded
- https://security-center.intel.com/advisory.aspx?intelid=INTEL-SA-00048&languageid=en-fr



