Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-8736 (GCVE-0-2020-8736)
Vulnerability from cvelistv5 – Published: 2020-08-13 02:22 – Updated: 2024-08-04 10:12- Escalation of Privilege
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Computing Improvement Program Advisory |
Affected:
Before version 2.4.5718
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T10:12:09.503Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) Computing Improvement Program Advisory",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Before version 2.4.5718"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Escalation of Privilege",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-08-13T02:22:20",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-8736",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Computing Improvement Program Advisory",
"version": {
"version_data": [
{
"version_value": "Before version 2.4.5718"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-8736",
"datePublished": "2020-08-13T02:22:20",
"dateReserved": "2020-02-06T00:00:00",
"dateUpdated": "2024-08-04T10:12:09.503Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:intel:computing_improvement_program:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"2.4.5718\", \"matchCriteriaId\": \"B6EA80B9-6F6C-4A2E-ABE5-486BF46DD819\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access.\"}, {\"lang\": \"es\", \"value\": \"Un control de acceso inapropiado en un subsistema para Intel\\u00ae Computing Improvement Program versiones anteriores a 2.4.5718, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local\"}]",
"id": "CVE-2020-8736",
"lastModified": "2024-11-21T05:39:21.163",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 7.8, \"baseSeverity\": \"HIGH\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-08-13T03:15:16.430",
"references": "[{\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html\", \"source\": \"secure@intel.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-8736\",\"sourceIdentifier\":\"secure@intel.com\",\"published\":\"2020-08-13T03:15:16.430\",\"lastModified\":\"2024-11-21T05:39:21.163\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access.\"},{\"lang\":\"es\",\"value\":\"Un control de acceso inapropiado en un subsistema para Intel\u00ae Computing Improvement Program versiones anteriores a 2.4.5718, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:intel:computing_improvement_program:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"2.4.5718\",\"matchCriteriaId\":\"B6EA80B9-6F6C-4A2E-ABE5-486BF46DD819\"}]}]}],\"references\":[{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html\",\"source\":\"secure@intel.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
GHSA-3225-53WC-82W5
Vulnerability from github – Published: 2022-05-24 17:25 – Updated: 2022-05-24 17:25Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access.
{
"affected": [],
"aliases": [
"CVE-2020-8736"
],
"database_specific": {
"cwe_ids": [
"CWE-269"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-08-13T03:15:00Z",
"severity": "MODERATE"
},
"details": "Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"id": "GHSA-3225-53wc-82w5",
"modified": "2022-05-24T17:25:41Z",
"published": "2022-05-24T17:25:41Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-8736"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html"
}
],
"schema_version": "1.4.0",
"severity": []
}
VAR-202008-1125
Vulnerability from variot - Updated: 2023-12-18 11:58Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) Computing Improvement Program Exists in a privilege management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Intel Computing Improvement Program is a software improvement program application program of Intel Corporation. This program is used to collect computer function usage information, component usage information, operating system information, etc. An attacker could exploit this vulnerability to elevate privileges
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-202008-1125",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "computing improvement program",
"scope": "lt",
"trust": 1.0,
"vendor": "intel",
"version": "2.4.5718"
},
{
"model": "computing improvement program",
"scope": "eq",
"trust": 0.8,
"vendor": "intel",
"version": "2.4.5718"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-009509"
},
{
"db": "NVD",
"id": "CVE-2020-8736"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:intel:computing_improvement_program:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.4.5718",
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2020-8736"
}
]
},
"cve": "CVE-2020-8736",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Local",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Partial",
"baseScore": 4.6,
"confidentialityImpact": "Partial",
"exploitabilityScore": null,
"id": "JVNDB-2020-009509",
"impactScore": null,
"integrityImpact": "Partial",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "Medium",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 3.9,
"id": "VHN-186861",
"impactScore": 6.4,
"integrityImpact": "PARTIAL",
"severity": "MEDIUM",
"trust": 0.1,
"vectorString": "AV:L/AC:L/AU:N/C:P/I:P/A:P",
"version": "2.0"
}
],
"cvssV3": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"author": "NVD",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"trust": 1.0,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
{
"attackComplexity": "Low",
"attackVector": "Local",
"author": "NVD",
"availabilityImpact": "High",
"baseScore": 7.8,
"baseSeverity": "High",
"confidentialityImpact": "High",
"exploitabilityScore": null,
"id": "JVNDB-2020-009509",
"impactScore": null,
"integrityImpact": "High",
"privilegesRequired": "Low",
"scope": "Unchanged",
"trust": 0.8,
"userInteraction": "None",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
}
],
"severity": [
{
"author": "NVD",
"id": "CVE-2020-8736",
"trust": 1.0,
"value": "HIGH"
},
{
"author": "NVD",
"id": "JVNDB-2020-009509",
"trust": 0.8,
"value": "High"
},
{
"author": "CNNVD",
"id": "CNNVD-202008-731",
"trust": 0.6,
"value": "HIGH"
},
{
"author": "VULHUB",
"id": "VHN-186861",
"trust": 0.1,
"value": "MEDIUM"
}
]
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-186861"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009509"
},
{
"db": "NVD",
"id": "CVE-2020-8736"
},
{
"db": "CNNVD",
"id": "CNNVD-202008-731"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) Computing Improvement Program Exists in a privilege management vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Intel Computing Improvement Program is a software improvement program application program of Intel Corporation. This program is used to collect computer function usage information, component usage information, operating system information, etc. An attacker could exploit this vulnerability to elevate privileges",
"sources": [
{
"db": "NVD",
"id": "CVE-2020-8736"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009509"
},
{
"db": "VULHUB",
"id": "VHN-186861"
}
],
"trust": 1.71
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2020-8736",
"trust": 2.5
},
{
"db": "JVN",
"id": "JVNVU99606488",
"trust": 0.8
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009509",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-202008-731",
"trust": 0.7
},
{
"db": "NSFOCUS",
"id": "48146",
"trust": 0.6
},
{
"db": "VULHUB",
"id": "VHN-186861",
"trust": 0.1
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-186861"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009509"
},
{
"db": "NVD",
"id": "CVE-2020-8736"
},
{
"db": "CNNVD",
"id": "CNNVD-202008-731"
}
]
},
"id": "VAR-202008-1125",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "VULHUB",
"id": "VHN-186861"
}
],
"trust": 0.01
},
"last_update_date": "2023-12-18T11:58:03.702000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "INTEL-SA-00387",
"trust": 0.8,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html"
}
],
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-009509"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
},
{
"problemtype": "CWE-269",
"trust": 0.9
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-186861"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009509"
},
{
"db": "NVD",
"id": "CVE-2020-8736"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.7,
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html"
},
{
"trust": 1.4,
"url": "https://nvd.nist.gov/vuln/detail/cve-2020-8736"
},
{
"trust": 0.8,
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-8736"
},
{
"trust": 0.8,
"url": "https://jvn.jp/vu/jvnvu99606488"
},
{
"trust": 0.6,
"url": "http://www.nsfocus.net/vulndb/48146"
}
],
"sources": [
{
"db": "VULHUB",
"id": "VHN-186861"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009509"
},
{
"db": "NVD",
"id": "CVE-2020-8736"
},
{
"db": "CNNVD",
"id": "CNNVD-202008-731"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "VULHUB",
"id": "VHN-186861"
},
{
"db": "JVNDB",
"id": "JVNDB-2020-009509"
},
{
"db": "NVD",
"id": "CVE-2020-8736"
},
{
"db": "CNNVD",
"id": "CNNVD-202008-731"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2020-08-13T00:00:00",
"db": "VULHUB",
"id": "VHN-186861"
},
{
"date": "2020-11-10T07:39:50",
"db": "JVNDB",
"id": "JVNDB-2020-009509"
},
{
"date": "2020-08-13T03:15:16.430000",
"db": "NVD",
"id": "CVE-2020-8736"
},
{
"date": "2020-08-12T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202008-731"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2021-07-21T00:00:00",
"db": "VULHUB",
"id": "VHN-186861"
},
{
"date": "2020-11-10T07:39:50",
"db": "JVNDB",
"id": "JVNDB-2020-009509"
},
{
"date": "2021-07-21T11:39:23.747000",
"db": "NVD",
"id": "CVE-2020-8736"
},
{
"date": "2020-08-27T00:00:00",
"db": "CNNVD",
"id": "CNNVD-202008-731"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "local",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202008-731"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Intel(R) Computing Improvement Program Vulnerability related to authority management in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2020-009509"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "other",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-202008-731"
}
],
"trust": 0.6
}
}
CERTFR-2020-AVI-497
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel Server Board de gamme S1200SP sans le dernier correctif de sécurité | ||
| Intel | N/A | les pilotes graphiques Intel (cf. section Documentation) | ||
| Intel | N/A | Intel NUC (cf. section Documentation) | ||
| Intel | N/A | les produits Intel PROSet/Wireless WiFi sur Windows 7 ou 8.1 versions antérieures à 21.40.5.1 | ||
| Intel | N/A | Intel Mailbox Interface driver (Intel recommande de le désinstaller) | ||
| Intel | N/A | Intel Server Board de gamme S2600WF sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Server Board de gamme S2600BP sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel RSTe Software RAID Driver pour Intel Server Board M10JNP2SB versions antérieures à 4.7.0.1119 | ||
| Intel | N/A | Intel PAC avec Arria 10 GX FPGA utilisant Intel Acceleration Stack versions antérieures à 1.2.1 | ||
| Intel | N/A | Intel Server Board de gamme S2600TP sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Server System de gammes R1000SP, LSVRP et LR1304SP sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Compute Module de gamme HNS2600TP sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Server Board M10JNP2SB versions antérieures à 7.210 | ||
| Intel | N/A | Intel Server Board de gamme S2600ST sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Compute Module de gamme HNS2600BP sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Server Boards de gamme S2600CW sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Server Board de gamme S2600KP sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Compute Module de gamme HNS2600KP sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Server System de gamme R1000WF et R2000WF sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel RAID Web Console 3 pour Windows versions antérieures à 7.012.016.000 | ||
| Intel | N/A | Intel Computing Improvement Program versions antérieures à 2.4.5718 | ||
| Intel | N/A | Intel Distribution of OpenVINO Toolkit versions antérieures à 2020.2 | ||
| Intel | N/A | Intel Server System de gammes R1000WT et R2000WT sans le dernier correctif de sécurité | ||
| Intel | N/A | les produits Intel Wireless Bluetooth (cf. section Documentation) | ||
| Intel | N/A | démon Intel Wireless for Open Source versions antérieures à 1.5 | ||
| Intel | N/A | Intel Server Boards de gamme S2600WT sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel RealSense D400 Series UWP driver pour Windows 10 versions antérieures à 6.1.160.14 | ||
| Intel | N/A | Intel LED Manager pour NUC versions antérieures à 1.2.3 | ||
| Intel | N/A | Intel Thunderbolt | ||
| Intel | N/A | Intel SSD DCT versions antérieures à 3.0.23 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel Server Board de gamme S1200SP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les pilotes graphiques Intel (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les produits Intel PROSet/Wireless WiFi sur Windows 7 ou 8.1 versions ant\u00e9rieures \u00e0 21.40.5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Mailbox Interface driver (Intel recommande de le d\u00e9sinstaller)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board de gamme S2600WF sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board de gamme S2600BP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel RSTe Software RAID Driver pour Intel Server Board M10JNP2SB versions ant\u00e9rieures \u00e0 4.7.0.1119",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PAC avec Arria 10 GX FPGA utilisant Intel Acceleration Stack versions ant\u00e9rieures \u00e0 1.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board de gamme S2600TP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server System de gammes R1000SP, LSVRP et LR1304SP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Compute Module de gamme HNS2600TP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board M10JNP2SB versions ant\u00e9rieures \u00e0 7.210",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board de gamme S2600ST sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Compute Module de gamme HNS2600BP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Boards de gamme S2600CW sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board de gamme S2600KP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Compute Module de gamme HNS2600KP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server System de gamme R1000WF et R2000WF sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel RAID Web Console 3 pour Windows versions ant\u00e9rieures \u00e0 7.012.016.000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Computing Improvement Program versions ant\u00e9rieures \u00e0 2.4.5718",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution of OpenVINO Toolkit versions ant\u00e9rieures \u00e0 2020.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server System de gammes R1000WT et R2000WT sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les produits Intel Wireless Bluetooth (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "d\u00e9mon Intel Wireless for Open Source versions ant\u00e9rieures \u00e0 1.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Boards de gamme S2600WT sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel RealSense D400 Series UWP driver pour Windows 10 versions ant\u00e9rieures \u00e0 6.1.160.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel LED Manager pour NUC versions ant\u00e9rieures \u00e0 1.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Thunderbolt",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD DCT versions ant\u00e9rieures \u00e0 3.0.23",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-0555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0555"
},
{
"name": "CVE-2020-8731",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8731"
},
{
"name": "CVE-2020-8717",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8717"
},
{
"name": "CVE-2020-8710",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8710"
},
{
"name": "CVE-2020-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8732"
},
{
"name": "CVE-2020-12287",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12287"
},
{
"name": "CVE-2020-8736",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8736"
},
{
"name": "CVE-2020-8719",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8719"
},
{
"name": "CVE-2020-8734",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8734"
},
{
"name": "CVE-2020-8683",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8683"
},
{
"name": "CVE-2020-8723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8723"
},
{
"name": "CVE-2020-8742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8742"
},
{
"name": "CVE-2020-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0553"
},
{
"name": "CVE-2020-8685",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8685"
},
{
"name": "CVE-2020-8681",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8681"
},
{
"name": "CVE-2020-8716",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8716"
},
{
"name": "CVE-2020-8688",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8688"
},
{
"name": "CVE-2020-8689",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8689"
},
{
"name": "CVE-2020-8712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8712"
},
{
"name": "CVE-2020-8711",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8711"
},
{
"name": "CVE-2020-12301",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12301"
},
{
"name": "CVE-2020-8682",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8682"
},
{
"name": "CVE-2020-8730",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8730"
},
{
"name": "CVE-2020-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0512"
},
{
"name": "CVE-2020-8763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8763"
},
{
"name": "CVE-2020-8684",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8684"
},
{
"name": "CVE-2020-0510",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0510"
},
{
"name": "CVE-2020-0554",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0554"
},
{
"name": "CVE-2020-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8715"
},
{
"name": "CVE-2020-8718",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8718"
},
{
"name": "CVE-2020-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8714"
},
{
"name": "CVE-2020-8720",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8720"
},
{
"name": "CVE-2020-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8713"
},
{
"name": "CVE-2020-8729",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8729"
},
{
"name": "CVE-2020-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8743"
},
{
"name": "CVE-2020-8722",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8722"
},
{
"name": "CVE-2019-14620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14620"
},
{
"name": "CVE-2020-8680",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8680"
},
{
"name": "CVE-2020-8759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8759"
},
{
"name": "CVE-2020-8721",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8721"
},
{
"name": "CVE-2020-12299",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12299"
},
{
"name": "CVE-2020-8706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8706"
},
{
"name": "CVE-2020-8708",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8708"
},
{
"name": "CVE-2020-0559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0559"
},
{
"name": "CVE-2020-8687",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8687"
},
{
"name": "CVE-2020-8679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8679"
},
{
"name": "CVE-2019-14630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14630"
},
{
"name": "CVE-2020-8733",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8733"
},
{
"name": "CVE-2020-8709",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8709"
},
{
"name": "CVE-2020-12300",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12300"
},
{
"name": "CVE-2020-0513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0513"
},
{
"name": "CVE-2020-8707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8707"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-497",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-08-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00411 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00411.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00375 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00375.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00387 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00386 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00386.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00379 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00379.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00376 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00376.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00378 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00378.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00396 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00396.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00377 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00377.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00337 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00337.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00369 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00392 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00392.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00355 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00384 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00394 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00394.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00399 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00399.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00406 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00406.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00367 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00367.html"
}
]
}
CERTFR-2020-AVI-497
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel Server Board de gamme S1200SP sans le dernier correctif de sécurité | ||
| Intel | N/A | les pilotes graphiques Intel (cf. section Documentation) | ||
| Intel | N/A | Intel NUC (cf. section Documentation) | ||
| Intel | N/A | les produits Intel PROSet/Wireless WiFi sur Windows 7 ou 8.1 versions antérieures à 21.40.5.1 | ||
| Intel | N/A | Intel Mailbox Interface driver (Intel recommande de le désinstaller) | ||
| Intel | N/A | Intel Server Board de gamme S2600WF sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Server Board de gamme S2600BP sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel RSTe Software RAID Driver pour Intel Server Board M10JNP2SB versions antérieures à 4.7.0.1119 | ||
| Intel | N/A | Intel PAC avec Arria 10 GX FPGA utilisant Intel Acceleration Stack versions antérieures à 1.2.1 | ||
| Intel | N/A | Intel Server Board de gamme S2600TP sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Server System de gammes R1000SP, LSVRP et LR1304SP sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Compute Module de gamme HNS2600TP sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Server Board M10JNP2SB versions antérieures à 7.210 | ||
| Intel | N/A | Intel Server Board de gamme S2600ST sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Compute Module de gamme HNS2600BP sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Server Boards de gamme S2600CW sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Server Board de gamme S2600KP sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Compute Module de gamme HNS2600KP sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel Server System de gamme R1000WF et R2000WF sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel RAID Web Console 3 pour Windows versions antérieures à 7.012.016.000 | ||
| Intel | N/A | Intel Computing Improvement Program versions antérieures à 2.4.5718 | ||
| Intel | N/A | Intel Distribution of OpenVINO Toolkit versions antérieures à 2020.2 | ||
| Intel | N/A | Intel Server System de gammes R1000WT et R2000WT sans le dernier correctif de sécurité | ||
| Intel | N/A | les produits Intel Wireless Bluetooth (cf. section Documentation) | ||
| Intel | N/A | démon Intel Wireless for Open Source versions antérieures à 1.5 | ||
| Intel | N/A | Intel Server Boards de gamme S2600WT sans le dernier correctif de sécurité | ||
| Intel | N/A | Intel RealSense D400 Series UWP driver pour Windows 10 versions antérieures à 6.1.160.14 | ||
| Intel | N/A | Intel LED Manager pour NUC versions antérieures à 1.2.3 | ||
| Intel | N/A | Intel Thunderbolt | ||
| Intel | N/A | Intel SSD DCT versions antérieures à 3.0.23 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel Server Board de gamme S1200SP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les pilotes graphiques Intel (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les produits Intel PROSet/Wireless WiFi sur Windows 7 ou 8.1 versions ant\u00e9rieures \u00e0 21.40.5.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Mailbox Interface driver (Intel recommande de le d\u00e9sinstaller)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board de gamme S2600WF sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board de gamme S2600BP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel RSTe Software RAID Driver pour Intel Server Board M10JNP2SB versions ant\u00e9rieures \u00e0 4.7.0.1119",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel PAC avec Arria 10 GX FPGA utilisant Intel Acceleration Stack versions ant\u00e9rieures \u00e0 1.2.1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board de gamme S2600TP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server System de gammes R1000SP, LSVRP et LR1304SP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Compute Module de gamme HNS2600TP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board M10JNP2SB versions ant\u00e9rieures \u00e0 7.210",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board de gamme S2600ST sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Compute Module de gamme HNS2600BP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Boards de gamme S2600CW sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board de gamme S2600KP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Compute Module de gamme HNS2600KP sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server System de gamme R1000WF et R2000WF sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel RAID Web Console 3 pour Windows versions ant\u00e9rieures \u00e0 7.012.016.000",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Computing Improvement Program versions ant\u00e9rieures \u00e0 2.4.5718",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Distribution of OpenVINO Toolkit versions ant\u00e9rieures \u00e0 2020.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server System de gammes R1000WT et R2000WT sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les produits Intel Wireless Bluetooth (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "d\u00e9mon Intel Wireless for Open Source versions ant\u00e9rieures \u00e0 1.5",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Boards de gamme S2600WT sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel RealSense D400 Series UWP driver pour Windows 10 versions ant\u00e9rieures \u00e0 6.1.160.14",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel LED Manager pour NUC versions ant\u00e9rieures \u00e0 1.2.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Thunderbolt",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel SSD DCT versions ant\u00e9rieures \u00e0 3.0.23",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-0555",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0555"
},
{
"name": "CVE-2020-8731",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8731"
},
{
"name": "CVE-2020-8717",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8717"
},
{
"name": "CVE-2020-8710",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8710"
},
{
"name": "CVE-2020-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8732"
},
{
"name": "CVE-2020-12287",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12287"
},
{
"name": "CVE-2020-8736",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8736"
},
{
"name": "CVE-2020-8719",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8719"
},
{
"name": "CVE-2020-8734",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8734"
},
{
"name": "CVE-2020-8683",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8683"
},
{
"name": "CVE-2020-8723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8723"
},
{
"name": "CVE-2020-8742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8742"
},
{
"name": "CVE-2020-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0553"
},
{
"name": "CVE-2020-8685",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8685"
},
{
"name": "CVE-2020-8681",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8681"
},
{
"name": "CVE-2020-8716",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8716"
},
{
"name": "CVE-2020-8688",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8688"
},
{
"name": "CVE-2020-8689",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8689"
},
{
"name": "CVE-2020-8712",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8712"
},
{
"name": "CVE-2020-8711",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8711"
},
{
"name": "CVE-2020-12301",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12301"
},
{
"name": "CVE-2020-8682",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8682"
},
{
"name": "CVE-2020-8730",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8730"
},
{
"name": "CVE-2020-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0512"
},
{
"name": "CVE-2020-8763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8763"
},
{
"name": "CVE-2020-8684",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8684"
},
{
"name": "CVE-2020-0510",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0510"
},
{
"name": "CVE-2020-0554",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0554"
},
{
"name": "CVE-2020-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8715"
},
{
"name": "CVE-2020-8718",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8718"
},
{
"name": "CVE-2020-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8714"
},
{
"name": "CVE-2020-8720",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8720"
},
{
"name": "CVE-2020-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8713"
},
{
"name": "CVE-2020-8729",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8729"
},
{
"name": "CVE-2020-8743",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8743"
},
{
"name": "CVE-2020-8722",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8722"
},
{
"name": "CVE-2019-14620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14620"
},
{
"name": "CVE-2020-8680",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8680"
},
{
"name": "CVE-2020-8759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8759"
},
{
"name": "CVE-2020-8721",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8721"
},
{
"name": "CVE-2020-12299",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12299"
},
{
"name": "CVE-2020-8706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8706"
},
{
"name": "CVE-2020-8708",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8708"
},
{
"name": "CVE-2020-0559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0559"
},
{
"name": "CVE-2020-8687",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8687"
},
{
"name": "CVE-2020-8679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8679"
},
{
"name": "CVE-2019-14630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14630"
},
{
"name": "CVE-2020-8733",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8733"
},
{
"name": "CVE-2020-8709",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8709"
},
{
"name": "CVE-2020-12300",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12300"
},
{
"name": "CVE-2020-0513",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0513"
},
{
"name": "CVE-2020-8707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8707"
}
],
"links": [],
"reference": "CERTFR-2020-AVI-497",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-08-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00411 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00411.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00375 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00375.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00387 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00386 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00386.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00379 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00379.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00376 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00376.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00378 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00378.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00396 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00396.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00377 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00377.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00337 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00337.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00369 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00392 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00392.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00355 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00384 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00384.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00394 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00394.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00399 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00399.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00406 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00406.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00367 du 11 ao\u00fbt 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00367.html"
}
]
}
GSD-2020-8736
Vulnerability from gsd - Updated: 2023-12-13 01:21{
"GSD": {
"alias": "CVE-2020-8736",
"description": "Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"id": "GSD-2020-8736"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-8736"
],
"details": "Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access.",
"id": "GSD-2020-8736",
"modified": "2023-12-13T01:21:53.866084Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-8736",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Computing Improvement Program Advisory",
"version": {
"version_data": [
{
"version_value": "Before version 2.4.5718"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Escalation of Privilege"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:intel:computing_improvement_program:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "2.4.5718",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-8736"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2021-07-21T11:39Z",
"publishedDate": "2020-08-13T03:15Z"
}
}
}
FKIE_CVE-2020-8736
Vulnerability from fkie_nvd - Published: 2020-08-13 03:15 - Updated: 2024-11-21 05:39| Vendor | Product | Version | |
|---|---|---|---|
| intel | computing_improvement_program | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:intel:computing_improvement_program:*:*:*:*:*:*:*:*",
"matchCriteriaId": "B6EA80B9-6F6C-4A2E-ABE5-486BF46DD819",
"versionEndExcluding": "2.4.5718",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Improper access control in subsystem for the Intel(R) Computing Improvement Program before version 2.4.5718 may allow an authenticated user to potentially enable escalation of privilege via local access."
},
{
"lang": "es",
"value": "Un control de acceso inapropiado en un subsistema para Intel\u00ae Computing Improvement Program versiones anteriores a 2.4.5718, puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local"
}
],
"id": "CVE-2020-8736",
"lastModified": "2024-11-21T05:39:21.163",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-08-13T03:15:16.430",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00387.html"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.