Hardware Accelerated Execution Manager Intel Hardware Accelerated Execution Manager

Do you want an email whenever new security vulnerabilities are reported in Intel Hardware Accelerated Execution Manager?

By the Year

In 2024 there have been 0 vulnerabilities in Intel Hardware Accelerated Execution Manager . Hardware Accelerated Execution Manager did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2024 0 0.00
2023 0 0.00
2022 1 7.80
2021 2 7.30
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Hardware Accelerated Execution Manager vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Intel Hardware Accelerated Execution Manager Security Vulnerabilities

Improper access control in the Intel(R) HAXM software before version 7.7.1 may

CVE-2022-21812 7.8 - High - August 18, 2022

Improper access control in the Intel(R) HAXM software before version 7.7.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Uncontrolled resource consumption in the Intel(R) HAXM software before version 7.6.6 may

CVE-2021-0182 6.2 - Medium - November 17, 2021

Uncontrolled resource consumption in the Intel(R) HAXM software before version 7.6.6 may allow an unauthenticated user to potentially enable information disclosure via local access.

Resource Exhaustion

Uncontrolled resource consumption in the Intel(R) HAXM software before version 7.6.6 may

CVE-2021-0180 8.4 - High - November 17, 2021

Uncontrolled resource consumption in the Intel(R) HAXM software before version 7.6.6 may allow an unauthenticated user to potentially enable privilege escalation via local access.

Resource Exhaustion

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Intel Hardware Accelerated Execution Manager or by Intel? Click the Watch button to subscribe.

Intel
Vendor

subscribe