The latest security information on Intel® products.

Impact of vulnerability

The impact type of vulnerability describes the type of harm an attack could cause if the vulnerability were exploited.

There are three types of impact: 

Elevation of privilege 
An attacker exploiting this vulnerability could assume greater privileges on a compromised system, allowing them to potentially destroy data or take control of computers for malicious purposes. 

Information disclosure
An attacker exploiting this vulnerability could obtain access to confidential information.

Denial of service 

An attacker exploiting this vulnerability could prevent authorized access to computing resources or interfere with a system’s operations.