Core M

by Intel

Review your setup

Core M has some exploitation signals but is generally manageable with regular updates.

What to do
  1. Keep this software updated
  2. Review your configuration for unnecessary exposure
  3. Check for known-vulnerable components or plugins

What Attackers Target

Vulnerabilities with high exploit probability 40.0%
Confirmed actively exploited (CISA) 0.0%
Public exploit code available 10.0%
Based on 10 known vulnerabilities. Percentages show the proportion that are actively dangerous — a low percentage means most vulnerabilities in this product are not being exploited.

Most Dangerous Vulnerabilities

CVE CVSS Exploit Probability Confirmed
CVE-2017-5753 5.6 94.3%
CVE-2017-5715 5.6 89.1%
CVE-2017-5754 5.6 87.6%
CVE-2018-3639 5.5 46.0%
CVE-2018-3646 5.6 3.9%
CVE-2018-3620 5.6 3.0%
CVE-2018-3693 5.6 1.3%
CVE-2018-3665 5.6 1.3%
CVE-2018-3640 5.6 0.9%
CVE-2018-9056 5.6 0.1%
37
/ 100
moderate-risk
Active Threat 34/50 · High
Exploit Availability 3/50 · Minimal

Score uses Wilson score intervals to account for sample size. Products with few CVEs are scored conservatively.