fkie_cve-2020-0559
Vulnerability from fkie_nvd
Published
2020-08-13 04:15
Modified
2024-11-21 04:53
Summary
Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Impacted products
Vendor Product Version
intel ac_3165_firmware *
intel ac_3168_firmware *
intel ac_7265_firmware *
intel ac_8260_firmware *
intel ac_8265_firmware *
intel ac_9260_firmware *
intel ac_9461_firmware *
intel ac_9462_firmware *
intel ac_9560_firmware *
intel ax200_firmware *
intel ax201_firmware *
microsoft windows_7 -
microsoft windows_8.1 -
intel atom_x5-e3930 -
intel atom_x5-e3940 -
intel atom_x7-e3950 -
intel celeron_j1750 -
intel celeron_j1800 -
intel celeron_j1850 -
intel celeron_j1900 -
intel celeron_j3060 -
intel celeron_j3160 -
intel celeron_j3355 -
intel celeron_j3355e -
intel celeron_j3455 -
intel celeron_j3455e -
intel celeron_j4005 -
intel celeron_j4025 -
intel celeron_j4105 -
intel celeron_j4125 -
intel celeron_j6412 -
intel celeron_j6413 -
intel celeron_n2805 -
intel celeron_n2806 -
intel celeron_n2807 -
intel celeron_n2808 -
intel celeron_n2810 -
intel celeron_n2815 -
intel celeron_n2820 -
intel celeron_n2830 -
intel celeron_n2840 -
intel celeron_n2910 -
intel celeron_n2920 -
intel celeron_n2930 -
intel celeron_n2940 -
intel celeron_n3000 -
intel celeron_n3010 -
intel celeron_n3050 -
intel celeron_n3060 -
intel celeron_n3150 -
intel celeron_n3160 -
intel celeron_n3350 -
intel celeron_n3350e -
intel celeron_n3450 -
intel celeron_n4000 -
intel celeron_n4020 -
intel celeron_n4100 -
intel celeron_n4120 -
intel celeron_n4500 -
intel celeron_n4505 -
intel celeron_n5100 -
intel celeron_n5105 -
intel celeron_n6210 -
intel celeron_n6211 -
intel pentium_j2850 -
intel pentium_j2900 -
intel pentium_j3710 -
intel pentium_j4205 -
intel pentium_j6426 -
intel pentium_n3510 -
intel pentium_n3520 -
intel pentium_n3530 -
intel pentium_n3540 -
intel pentium_n3700 -
intel pentium_n3710 -
intel pentium_n4200 -
intel pentium_n4200e -
intel pentium_n6415 -



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B1D228D-F534-403C-AC21-D5F70837B54E",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "6039F5F9-2A90-4C9A-BCDB-46D65405DDB5",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_7265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "ABAAA905-8F73-42E3-A671-62B05EC15F1F",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB144F2E-310A-450D-8A22-17F424F81AA2",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "1DC3822C-6E11-4724-9202-295769A2AFAE",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "509E3392-937E-4940-ADD7-DDA6B5E844B3",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "7C7CC7F8-0540-4290-B820-E79E8B20AB5B",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C6132269-0DD9-4C5A-B200-F563D3331D6A",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "F1554EA6-3064-44F7-B9B2-481E20FECCA2",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "3B2C0B85-91ED-444C-95CC-90D021F6B1A4",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "E1CE863B-3980-46AC-816C-4380829E19F7",
              "versionEndExcluding": "21.40.5.1",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        },
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E33796DB-4523-4F04-B564-ADF030553D51",
              "vulnerable": false
            },
            {
              "criteria": "cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "E93068DB-549B-45AB-8E5C-00EB5D8B5CF8",
              "vulnerable": false
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ],
      "operator": "AND"
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "454AC633-5F1C-47BB-8FA7-91A5C29A1DD5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2394E8C-58D9-480B-87A7-A41CD7697FC6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B9AC02B-D3AE-4FAF-836E-55515186A462",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2F55513-48F4-44EC-9293-2CA744FCE07B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "51D52347-FA7F-4592-99E4-4C01D2833F35",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "82EC9A22-4893-4770-A501-31D492DC7EC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "744EC990-7849-4BC1-BC75-1D64693645A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B949F28E-5C73-4222-973E-DC39325E9268",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "132E32FD-4A52-43AF-9C0A-75F299B4C93F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7087FCA7-6D5C-45A5-B380-533915BC608A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "85683891-11D4-47B1-834B-5E0380351E78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "DBF2D89D-AC2D-4EAB-ADF3-66C25FE54E19",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "03D778C7-F242-4A6A-9B62-A7C578D985FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "652EC574-B9B6-4747-AE72-39D1379A596B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "522A9A57-B8D8-4C61-92E3-BE894A765C12",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A588BEB3-90B5-482E-B6C4-DC6529B0B4C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "826BAF04-E174-483D-8700-7FA1EAC4D555",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D3162DD-BF40-4A58-8FC4-63B4455C0E51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F7A8BF58-1D33-484A-951C-808443912BE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "04CEC115-871B-4222-A3F8-6B1EE15E9A2C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3FD0BD9D-F741-457D-9495-8BCC3707D098",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2935CEA-13CE-4F4C-84B1-0318FB6FE39A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C3BB7241-F796-44A7-8171-B555A45FF852",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F967E7C-E56D-46B2-AEB8-1931FA324029",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D902C7F-DCE8-41ED-8E80-26DA251FBF36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "71C505E0-3548-49BD-9B53-2A588FF29144",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E735023-A75C-48E3-AD6B-BB29CF95B17F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3826FEBA-0B2E-403D-9A6A-0DA02FEF9A2B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "4080CDEF-3938-44D5-9737-6A9D72DB54B7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A77976A7-6C2D-4E0B-A28B-06A23EEA0D68",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5600350-04CC-4481-AC47-9F98BEB9D258",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A5A64D0A-D1C2-41B3-B51B-563263438CA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B57F4250-80C8-4612-97F6-2702D3F7DF25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AA180B4-0EB8-4884-A600-BFAEB64A0A58",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "27D79952-8946-488A-8BD8-6129D97A8E34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B17905A-95E2-4E60-8A0F-AA8ABAF9D523",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "752081F5-AE8D-4004-B564-863840AC52E1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5375A75A-85AA-4119-9F6C-1AD9D2550F6B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "F5884F21-BAB5-4A45-8C72-C90D07BAECA8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EC2A2AC5-FA56-49F0-BA00-E96B10FEF889",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B8FF7ADD-9E27-4A23-9714-5B76132C20BC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C8771AB4-2F51-494D-8C86-3524BB4219C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "6D7E822D-994F-410D-B13C-939449FFC293",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB5576F2-4914-427C-9518-ED7D16630CC5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "3ABB7C52-863F-4291-A05B-422EE9615FAE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B54D15DF-53EA-4611-932A-EDB8279F582A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE7B5E21-2796-4578-998F-B03E26277DE7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "96D6F5D3-3559-47AD-8201-C9D34417DC09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "AA455AC5-8434-4B59-BE89-E82CDACD2AEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5D31CA93-6F45-4BCE-B504-35F6494B864C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "406E9139-BCFF-406B-A856-57896D27B752",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "1C43D202-D661-4042-9F68-0FA7EE73CFEE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "29ECACD3-E10C-4773-B847-8C1C097C45FA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "56C4EF86-84BF-48F4-88DE-8142A270D4A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6585755-C56C-4910-A7D5-B2153396AC7A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "7596F281-BA94-4239-8238-AA5EC804AE11",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A635B99E-A03F-488A-A01B-B390691EA03B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "22EAE772-AFAC-4272-8129-B416B171490C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDB3841D-3872-42BD-B0FB-E3E61813CA63",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "C5DC1B8F-3F6C-49D8-BF5F-54146DE3E83C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "A1A836B1-451E-4CEF-8A14-89FFB9289DD3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BC51285-B40A-4BEA-9CFF-F3BC01B5BA80",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A944A8C-462E-4FF9-8AD6-1687297DD0DE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "5378FE6C-251A-4BCD-B151-EA42B594DC37",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "638FA431-71EA-4668-AFF2-989A4994ED12",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
    },
    {
      "lang": "es",
      "value": "Unos permisos heredados no seguros en algunos productos Intel\u00ae PROSet/Wireless WiFi en Windows* versiones 7 y 8.1 anteriores a versi\u00f3n 21.40.5.1, pueden permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
    }
  ],
  "id": "CVE-2020-0559",
  "lastModified": "2024-11-21T04:53:45.603",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 7.8,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "HIGH",
          "privilegesRequired": "LOW",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 1.8,
        "impactScore": 5.9,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-08-13T04:15:12.913",
  "references": [
    {
      "source": "secure@intel.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
    },
    {
      "source": "secure@intel.com",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html"
    }
  ],
  "sourceIdentifier": "secure@intel.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-732"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…