CERTFR-2020-AVI-497

Vulnerability from certfr_avis - Published: - Updated:

De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.

Solution

Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).

None
Impacted products
Vendor Product Description
Intel N/A Intel Server Board de gamme S1200SP sans le dernier correctif de sécurité
Intel N/A les pilotes graphiques Intel (cf. section Documentation)
Intel N/A Intel NUC (cf. section Documentation)
Intel N/A les produits Intel PROSet/Wireless WiFi sur Windows 7 ou 8.1 versions antérieures à 21.40.5.1
Intel N/A Intel Mailbox Interface driver (Intel recommande de le désinstaller)
Intel N/A Intel Server Board de gamme S2600WF sans le dernier correctif de sécurité
Intel N/A Intel Server Board de gamme S2600BP sans le dernier correctif de sécurité
Intel N/A Intel RSTe Software RAID Driver pour Intel Server Board M10JNP2SB versions antérieures à 4.7.0.1119
Intel N/A Intel PAC avec Arria 10 GX FPGA utilisant Intel Acceleration Stack versions antérieures à 1.2.1
Intel N/A Intel Server Board de gamme S2600TP sans le dernier correctif de sécurité
Intel N/A Intel Server System de gammes R1000SP, LSVRP et LR1304SP sans le dernier correctif de sécurité
Intel N/A Intel Compute Module de gamme HNS2600TP sans le dernier correctif de sécurité
Intel N/A Intel Server Board M10JNP2SB versions antérieures à 7.210
Intel N/A Intel Server Board de gamme S2600ST sans le dernier correctif de sécurité
Intel N/A Intel Compute Module de gamme HNS2600BP sans le dernier correctif de sécurité
Intel N/A Intel Server Boards de gamme S2600CW sans le dernier correctif de sécurité
Intel N/A Intel Server Board de gamme S2600KP sans le dernier correctif de sécurité
Intel N/A Intel Compute Module de gamme HNS2600KP sans le dernier correctif de sécurité
Intel N/A Intel Server System de gamme R1000WF et R2000WF sans le dernier correctif de sécurité
Intel N/A Intel RAID Web Console 3 pour Windows versions antérieures à 7.012.016.000
Intel N/A Intel Computing Improvement Program versions antérieures à 2.4.5718
Intel N/A Intel Distribution of OpenVINO Toolkit versions antérieures à 2020.2
Intel N/A Intel Server System de gammes R1000WT et R2000WT sans le dernier correctif de sécurité
Intel N/A les produits Intel Wireless Bluetooth (cf. section Documentation)
Intel N/A démon Intel Wireless for Open Source versions antérieures à 1.5
Intel N/A Intel Server Boards de gamme S2600WT sans le dernier correctif de sécurité
Intel N/A Intel RealSense D400 Series UWP driver pour Windows 10 versions antérieures à 6.1.160.14
Intel N/A Intel LED Manager pour NUC versions antérieures à 1.2.3
Intel N/A Intel Thunderbolt
Intel N/A Intel SSD DCT versions antérieures à 3.0.23
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Intel Server Board de gamme S1200SP sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "les pilotes graphiques Intel (cf. section Documentation)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel NUC (cf. section Documentation)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "les produits Intel PROSet/Wireless WiFi sur Windows 7 ou 8.1 versions ant\u00e9rieures \u00e0 21.40.5.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Mailbox Interface driver (Intel recommande de le d\u00e9sinstaller)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board de gamme S2600WF sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board de gamme S2600BP sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel RSTe Software RAID Driver pour Intel Server Board M10JNP2SB versions ant\u00e9rieures \u00e0 4.7.0.1119",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel PAC avec Arria 10 GX FPGA utilisant Intel Acceleration Stack versions ant\u00e9rieures \u00e0 1.2.1",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board de gamme S2600TP sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server System de gammes R1000SP, LSVRP et LR1304SP sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Compute Module de gamme HNS2600TP sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board M10JNP2SB versions ant\u00e9rieures \u00e0 7.210",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board de gamme S2600ST sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Compute Module de gamme HNS2600BP sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Boards de gamme S2600CW sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Board de gamme S2600KP sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Compute Module de gamme HNS2600KP sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server System de gamme R1000WF et R2000WF sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel RAID Web Console 3 pour Windows versions ant\u00e9rieures \u00e0 7.012.016.000",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Computing Improvement Program versions ant\u00e9rieures \u00e0 2.4.5718",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Distribution of OpenVINO Toolkit versions ant\u00e9rieures \u00e0 2020.2",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server System de gammes R1000WT et R2000WT sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "les produits Intel Wireless Bluetooth (cf. section Documentation)",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "d\u00e9mon Intel Wireless for Open Source versions ant\u00e9rieures \u00e0 1.5",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Server Boards de gamme S2600WT sans le dernier correctif de s\u00e9curit\u00e9",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel RealSense D400 Series UWP driver pour Windows 10 versions ant\u00e9rieures \u00e0 6.1.160.14",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel LED Manager pour NUC versions ant\u00e9rieures \u00e0 1.2.3",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel Thunderbolt",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    },
    {
      "description": "Intel SSD DCT versions ant\u00e9rieures \u00e0 3.0.23",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Intel",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
  "cves": [
    {
      "name": "CVE-2020-0555",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0555"
    },
    {
      "name": "CVE-2020-8731",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8731"
    },
    {
      "name": "CVE-2020-8717",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8717"
    },
    {
      "name": "CVE-2020-8710",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8710"
    },
    {
      "name": "CVE-2020-8732",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8732"
    },
    {
      "name": "CVE-2020-12287",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12287"
    },
    {
      "name": "CVE-2020-8736",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8736"
    },
    {
      "name": "CVE-2020-8719",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8719"
    },
    {
      "name": "CVE-2020-8734",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8734"
    },
    {
      "name": "CVE-2020-8683",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8683"
    },
    {
      "name": "CVE-2020-8723",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8723"
    },
    {
      "name": "CVE-2020-8742",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8742"
    },
    {
      "name": "CVE-2020-0553",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0553"
    },
    {
      "name": "CVE-2020-8685",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8685"
    },
    {
      "name": "CVE-2020-8681",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8681"
    },
    {
      "name": "CVE-2020-8716",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8716"
    },
    {
      "name": "CVE-2020-8688",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8688"
    },
    {
      "name": "CVE-2020-8689",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8689"
    },
    {
      "name": "CVE-2020-8712",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8712"
    },
    {
      "name": "CVE-2020-8711",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8711"
    },
    {
      "name": "CVE-2020-12301",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12301"
    },
    {
      "name": "CVE-2020-8682",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8682"
    },
    {
      "name": "CVE-2020-8730",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8730"
    },
    {
      "name": "CVE-2020-0512",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0512"
    },
    {
      "name": "CVE-2020-8763",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8763"
    },
    {
      "name": "CVE-2020-8684",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8684"
    },
    {
      "name": "CVE-2020-0510",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0510"
    },
    {
      "name": "CVE-2020-0554",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0554"
    },
    {
      "name": "CVE-2020-8715",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8715"
    },
    {
      "name": "CVE-2020-8718",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8718"
    },
    {
      "name": "CVE-2020-8714",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8714"
    },
    {
      "name": "CVE-2020-8720",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8720"
    },
    {
      "name": "CVE-2020-8713",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8713"
    },
    {
      "name": "CVE-2020-8729",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8729"
    },
    {
      "name": "CVE-2020-8743",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8743"
    },
    {
      "name": "CVE-2020-8722",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8722"
    },
    {
      "name": "CVE-2019-14620",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14620"
    },
    {
      "name": "CVE-2020-8680",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8680"
    },
    {
      "name": "CVE-2020-8759",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8759"
    },
    {
      "name": "CVE-2020-8721",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8721"
    },
    {
      "name": "CVE-2020-12299",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12299"
    },
    {
      "name": "CVE-2020-8706",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8706"
    },
    {
      "name": "CVE-2020-8708",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8708"
    },
    {
      "name": "CVE-2020-0559",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0559"
    },
    {
      "name": "CVE-2020-8687",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8687"
    },
    {
      "name": "CVE-2020-8679",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8679"
    },
    {
      "name": "CVE-2019-14630",
      "url": "https://www.cve.org/CVERecord?id=CVE-2019-14630"
    },
    {
      "name": "CVE-2020-8733",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8733"
    },
    {
      "name": "CVE-2020-8709",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8709"
    },
    {
      "name": "CVE-2020-12300",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-12300"
    },
    {
      "name": "CVE-2020-0513",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-0513"
    },
    {
      "name": "CVE-2020-8707",
      "url": "https://www.cve.org/CVERecord?id=CVE-2020-8707"
    }
  ],
  "links": [],
  "reference": "CERTFR-2020-AVI-497",
  "revisions": [
    {
      "description": "Version initiale",
      "revision_date": "2020-08-12T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
    },
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
  "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00411 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00411.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00375 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00375.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00387 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00386 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00386.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00379 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00379.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00376 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00376.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00378 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00378.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00396 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00396.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00377 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00377.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00337 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00337.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00369 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00392 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00392.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00355 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00384 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00394 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00394.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00399 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00399.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00406 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00406.html"
    },
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00367 du 11 ao\u00fbt 2020",
      "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00367.html"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…