Vulnerability Database

328,409

Total vulnerabilities in the database

CVE-2021-0144

Insecure default variable initialization for the Intel BSSA DFT feature may allow a privileged user to potentially enable an escalation of privilege via local access.

  • Published: Jul 14, 2021
  • Updated: Nov 16, 2025
  • CVE: CVE-2021-0144
  • Severity: Medium
  • Exploit:

CVSS v3:

  • Severity: Medium
  • Score: 6.7
  • AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVSS v2:

  • Severity: High
  • Score: 7.2
  • AV:L/AC:L/Au:N/C:C/I:C/A:C
Software From Fixed in
intel / core_i7 8550u 8550u.x
intel / core_i7 8650u 8650u.x
intel / core_i7 8700 8700.x
intel / core_i7 8700k 8700k.x
intel / core_i5 8350u 8350u.x
intel / core_i5 8250u 8250u.x
intel / core_i5 8400 8400.x
intel / core_i5 8600k 8600k.x
intel / core_i7 7920hq 7920hq.x
intel / core_i7 7820hq 7820hq.x
intel / core_i7 7820hk 7820hk.x
intel / core_i7 7820eq 7820eq.x
intel / core_i7 7700hq 7700hq.x
intel / core_i7 7700 7700.x
intel / core_i7 7700k 7700k.x
intel / core_i7 7700t 7700t.x
intel / core_i7 7660u 7660u.x
intel / core_i7 7600u 7600u.x
intel / core_i7 7567u 7567u.x
intel / core_i7 7560u 7560u.x
intel / core_i7 7500u 7500u.x
intel / core_i5 6600 6600.x
intel / core_i5 6685r 6685r.x
intel / core_i5 6600k 6600k.x
intel / core_i5 6600t 6600t.x
intel / core_i5 6585r 6585r.x
intel / core_i5 6500 6500.x
intel / core_i5 6500t 6500t.x
intel / core_i5 6500te 6500te.x
intel / core_i5 6402p 6402p.x
intel / core_i5 6400 6400.x
intel / core_i5 6400t 6400t.x
intel / core_i5 6440eq 6440eq.x
intel / core_i5 6440hq 6440hq.x
intel / core_i5 6442eq 6442eq.x
intel / core_i5 6360u 6360u.x
intel / core_i5 6350hq 6350hq.x
intel / core_i5 6300hq 6300hq.x
intel / core_i5 6300u 6300u.x
intel / core_i5 6200u 6200u.x
intel / core_i5 6260u 6260u.x
intel / core_i5 6267u 6267u.x
intel / core_i5 6287u 6287u.x
intel / xeon_e3 1535m_v6 1535m_v6.x
intel / xeon_e3 1505m_v6 1505m_v6.x
intel / xeon_e3 1585_v5 1585_v5.x
intel / xeon_e3 1585l_v5 1585l_v5.x
intel / xeon_e3 1578l_v5 1578l_v5.x
intel / xeon_e3 1575m_v5 1575m_v5.x
intel / xeon_e3 1565l_v5 1565l_v5.x
intel / xeon_e3 1558l_v5 1558l_v5.x
intel / xeon_e3 1545m_v5 1545m_v5.x
intel / xeon_e3 1535m_v5 1535m_v5.x
intel / xeon_e3 1515m_v5 1515m_v5.x
intel / core_i7 990x 990x.x
intel / core_i7 980x 980x.x
intel / core_i7 975 975.x
intel / core_i7 965 965.x
intel / core_i7 940xm 940xm.x
intel / core_i7 920xm 920xm.x
intel / core_i7 920 920.x
intel / core_i7 860 860.x
intel / core_i7 820qm 820qm.x
intel / core_i7 720qm 720qm.x
intel / core_i7 610e 610e.x
intel / core_i7 980 980.x
intel / core_i7 970 970.x
intel / core_i7 960 960.x
intel / core_i7 950 950.x
intel / core_i7 940 940.x
intel / core_i7 930 930.x
intel / core_i7 880 880.x
intel / core_i7 875k 875k.x
intel / core_i7 870s 870s.x
intel / core_i7 870 870.x
intel / core_i7 860s 860s.x
intel / core_i7 840qm 840qm.x
intel / core_i7 740qm 740qm.x
intel / core_i7 680um 680um.x
intel / core_i7 660um 660um.x
intel / core_i7 660ue 660ue.x
intel / core_i7 660lm 660lm.x
intel / core_i7 640um 640um.x
intel / core_i7 640m 640m.x
intel / core_i7 640lm 640lm.x
intel / core_i7 620um 620um.x
intel / core_i7 620ue 620ue.x
intel / core_i7 620m 620m.x
intel / core_i7 620lm 620lm.x
intel / core_i7 620le 620le.x
intel / xeon_e3 125c_ 125c_.x
intel / xeon_e3 l3403 l3403.x
intel / xeon_e3 l3406 l3406.x
intel / xeon_e3 l3426 l3426.x
intel / xeon_e3 x3430 x3430.x
intel / xeon_e3 x3440 x3440.x
intel / xeon_e3 x3450 x3450.x
intel / xeon_e3 x3460 x3460.x
intel / xeon_e3 x3470 x3470.x
intel / xeon_e3 x3480 x3480.x
intel / xeon_e3 3600 3600.x
intel / xeon_e3 l5506 l5506.x
intel / xeon_e3 l5508_ l5508_.x
intel / xeon_e3 l5518_ l5518_.x
intel / xeon_e3 l5520 l5520.x
intel / xeon_e3 l5530 l5530.x
intel / xeon_e3 e5502 e5502.x
intel / xeon_e3 e5503 e5503.x
intel / xeon_e3 e5504 e5504.x
intel / xeon_e3 e5506 e5506.x
intel / xeon_e3 e5507 e5507.x
intel / xeon_e3 e5520 e5520.x
intel / xeon_e3 e5530 e5530.x
intel / xeon_e3 e5540 e5540.x
intel / xeon_e3 x5550 x5550.x
intel / xeon_e3 x5560 x5560.x
intel / xeon_e3 x5570 x5570.x
intel / xeon_e3 w5580 w5580.x
intel / xeon_e3 w5590 w5590.x
intel / xeon_e3 5600 5600.x
intel / xeon_e3 e6510 e6510.x
intel / xeon_e3 e6540 e6540.x
intel / xeon_e3 e6550 e6550.x
intel / xeon_e3 7500 7500.x
intel / core_i7 8809g 8809g.x
intel / core_i7 8709g 8709g.x
intel / core_i7 8706g 8706g.x
intel / core_i7 8705g 8705g.x
intel / core_i7 8750h 8750h.x
intel / core_i7 8700t 8700t.x
intel / core_i7 8700b 8700b.x
intel / core_i7 8565u 8565u.x
intel / core_i7 8559u 8559u.x
intel / core_i7 8500y 8500y.x
intel / core_i7 8086k 8086k.x
intel / core_i7 8850h 8850h.x
intel / core_i5 8600 8600.x
intel / core_i5 8500t 8500t.x
intel / core_i5 8500b 8500b.x
intel / core_i5 8500 8500.x
intel / core_i5 8400t 8400t.x
intel / core_i5 8400h 8400h.x
intel / core_i5 8400b 8400b.x
intel / core_i5 8305g 8305g.x
intel / core_i5 8300h 8300h.x
intel / core_i5 8269u 8269u.x
intel / core_i5 8265u 8265u.x
intel / core_i5 8259u 8259u.x
intel / core_i5 8200y 8200y.x
intel / core_i5 8600t 8600t.x
intel / core_i5 7600t 7600t.x
intel / core_i5 7600 7600.x
intel / core_i5 7500 7500.x
intel / core_i5 7500t 7500t.x
intel / core_i5 7442eq 7442eq.x
intel / core_i5 7440hq 7440hq.x
intel / core_i5 7440eq 7440eq.x
intel / core_i5 7400t 7400t.x
intel / core_i5 7400 7400.x
intel / core_i5 7360u 7360u.x
intel / core_i5 7300u 7300u.x
intel / core_i5 7300hq 7300hq.x
intel / core_i5 7287u 7287u.x
intel / core_i5 7267u 7267u.x
intel / core_i5 7260u 7260u.x
intel / core_i5 7200u 7200u.x
intel / core_i5 7600k 7600k.x
intel / core_i9 8950hk 8950hk.x
intel / core_i7 6950x 6950x.x
intel / core_i7 6900k 6900k.x
intel / core_i7 6850k 6850k.x
intel / core_i7 6800k 6800k.x
intel / core_i5 7640x 7640x.x
intel / core_i7 7800x 7800x.x
intel / core_i7 7740x 7740x.x
intel / core_i7 7820x 7820x.x
intel / core_i9 7960x 7960x.x
intel / core_i9 7940x 7940x.x
intel / core_i9 7920x 7920x.x
intel / core_i9 7900x 7900x.x
intel / core_i9 7980xe 7980xe.x
intel / core_i7 6700k 6700k.x
intel / core_i7 6700t 6700t.x
intel / core_i7 6700te 6700te.x
intel / core_i7 6700 6700.x
intel / core_i7 6770hq 6770hq.x
intel / core_i7 6700hq 6700hq.x
intel / core_i7 6660u 6660u.x
intel / core_i7 6650u 6650u.x
intel / core_i7 6600u 6600u.x
intel / core_i7 6567u 6567u.x
intel / core_i7 6560u 6560u.x
intel / core_i7 6500u 6500u.x
intel / core_i7 6785r 6785r.x
intel / core_i7 6820eq 6820eq.x
intel / core_i7 6820hk 6820hk.x
intel / core_i7 6820hq 6820hq.x
intel / core_i7 6822eq 6822eq.x
intel / core_i7 6870hq 6870hq.x
intel / core_i7 6920hq 6920hq.x
intel / core_i7 6970hq 6970hq.x
intel / core_i7 700t 700t.x
intel / xeon_e3-1585 5 5.x
intel / xeon_e3-1585l 5 5.x
intel / xeon_e3-1578l 5 5.x
intel / xeon_e3-1575m 5 5.x
intel / xeon_e3-1565l 5 5.x
intel / xeon_e3-1558l 5 5.x
intel / xeon_e3-1545m 5 5.x
intel / xeon_e3-1535m 5 5.x
intel / xeon_e3-1515m 5 5.x
intel / xeon_e3-1505m 5 5.x
intel / xeon_e3-1505l 5 5.x
intel / xeon_e3-1280 5 5.x
intel / xeon_e3-1275 5 5.x
intel / xeon_e3-1270 5 5.x
intel / xeon_e3-1268l 5 5.x
intel / xeon_e3-1260l 5 5.x
intel / xeon_e3-1245 5 5.x
intel / xeon_e3-1240l 5 5.x
intel / xeon_e3-1240 5 5.x
intel / xeon_e3-1235l 5 5.x
intel / xeon_e3-1230 5 5.x
intel / xeon_e3-1225 5 5.x
intel / xeon_e3-1220 5 5.x
intel / xeon_e3-1535m 6 6.x
intel / xeon_e3-1505m 6 6.x
intel / xeon_e3-1505l 6 6.x
intel / xeon_e3-1501l 6 6.x
intel / xeon_e3-1501m 6 6.x
intel / xeon_e3-1285 6 6.x
intel / xeon_e3-1280 6 6.x
intel / xeon_e3-1275 6 6.x
intel / xeon_e3-1270 6 6.x
intel / xeon_e3-1245 6 6.x
intel / xeon_e3-1240 6 6.x
intel / xeon_e3-1230 6 6.x
intel / xeon_e3-1225 6 6.x
intel / xeon_e3-1220 6 6.x
intel / core_i7 1065g7 1065g7.x
intel / core_i7 1060g7 1060g7.x
intel / core_i7 10510u 10510u.x
intel / core_i7 10510y 10510y.x
intel / core_i7 10710u 10710u.x
intel / core_i7 8569u 8569u.x
intel / core_i5 8365ue 8365ue.x
intel / core_i5 8365u 8365u.x
intel / core_i5 8257u 8257u.x
intel / core_i5 8210y 8210y.x
intel / core_i7 8557u 8557u.x
intel / core_i7 8665u 8665u.x
intel / core_i7 8665ue 8665ue.x

Frequently Asked Questions

A security vulnerability is a weakness in software, hardware, or configuration that can be exploited to compromise confidentiality, integrity, or availability. Many vulnerabilities are tracked as CVEs (Common Vulnerabilities and Exposures), which provide a standardized identifier so teams can coordinate patching, mitigation, and risk assessment across tools and vendors.

CVSS (Common Vulnerability Scoring System) estimates technical severity, but it doesn't automatically equal business risk. Prioritize using context like internet exposure, affected asset criticality, known exploitation (proof-of-concept or in-the-wild), and whether compensating controls exist. A "Medium" CVSS on an exposed, production system can be more urgent than a "Critical" on an isolated, non-production host.

A vulnerability is the underlying weakness. An exploit is the method or code used to take advantage of it. A zero-day is a vulnerability that is unknown to the vendor or has no publicly available fix when attackers begin using it. In practice, risk increases sharply when exploitation becomes reliable or widespread.

Recurring findings usually come from incomplete Asset Discovery, inconsistent patch management, inherited images, and configuration drift. In modern environments, you also need to watch the software supply chain: dependencies, containers, build pipelines, and third-party services can reintroduce the same weakness even after you patch a single host. Unknown or unmanaged assets (often called Shadow IT) are a common reason the same issues resurface.

Use a simple, repeatable triage model: focus first on externally exposed assets, high-value systems (identity, VPN, email, production), vulnerabilities with known exploits, and issues that enable remote code execution or privilege escalation. Then enforce patch SLAs and track progress using consistent metrics so remediation is steady, not reactive.

SynScan combines attack surface monitoring and continuous security auditing to keep your inventory current, flag high-impact vulnerabilities early, and help you turn raw findings into a practical remediation plan.