ID

VAR-201912-0878


CVE

CVE-2019-14609


TITLE

Intel(R) NUC(R) Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2019-013795

DESCRIPTION

Improper input validation in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) NUC(R) Contains an input validation vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Intel NUC 8 Mainstream Game Kit and so on are a small desktop computer of Intel Corporation of the United States

Trust: 2.16

sources: NVD: CVE-2019-14609 // JVNDB: JVNDB-2019-013795 // CNVD: CNVD-2020-04680

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-04680

AFFECTED PRODUCTS

vendor:intelmodel:cd1p64gkscope:ltversion:0053

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream game mini computerscope:ltversion:0036

Trust: 1.0

vendor:intelmodel:cd1iv128mkscope:ltversion:0038

Trust: 1.0

vendor:intelmodel:nuc6caysscope:ltversion:0064

Trust: 1.0

vendor:intelmodel:nuc7i5dnkescope:ltversion:0067

Trust: 1.0

vendor:intelmodel:nuc6i5syhscope:ltversion:0072

Trust: 1.0

vendor:intelmodel:nuc8i3cysmscope:ltversion:0043

Trust: 1.0

vendor:intelmodel:nuc8i7bekscope:ltversion:0077

Trust: 1.0

vendor:intelmodel:nuc7cjyhscope:ltversion:0053

Trust: 1.0

vendor:intelmodel:nuc6i7kykscope:ltversion:0066

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream game kitscope:ltversion:0036

Trust: 1.0

vendor:intelmodel:stk2mv64ccscope:ltversion:0061

Trust: 1.0

vendor:intelmodel:nuc8i7hnkscope:ltversion:0059

Trust: 1.0

vendor:intelmodel:nuc7i7dnkescope:ltversion:0067

Trust: 1.0

vendor:intelmodel:d34010wybscope:ltversion:0054

Trust: 1.0

vendor:intelmodel:cd1m3128mkscope:ltversion:0058

Trust: 1.0

vendor:intelmodel:de3815tybescope:ltversion:0024

Trust: 1.0

vendor:intelmodel:nuc7i3dnhescope:ltversion:0067

Trust: 1.0

vendor:intelmodel:stk2m3w64ccscope:ltversion:0062

Trust: 1.0

vendor:intelmodel:cd1p64gkscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc 8 mainstream game kitscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc 8 mainstream game mini computerscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc7i3dnhescope: - version: -

Trust: 0.8

vendor:intelmodel:nuc7i5dnkescope: - version: -

Trust: 0.8

vendor:intelmodel:nuc7i7dnkescope: - version: -

Trust: 0.8

vendor:intelmodel:nuc8i3cysmscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc8i7bekscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc8i7hnkscope: - version: -

Trust: 0.8

vendor:intelmodel:stk2mv64ccscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kit nuc7cjyhscope: - version: -

Trust: 0.6

vendor:intelmodel:nuc kit nuc8i7hnkscope: - version: -

Trust: 0.6

vendor:intelmodel:compute card cd1m3128mkscope: - version: -

Trust: 0.6

vendor:intelmodel:compute card cd1iv128mkscope: - version: -

Trust: 0.6

vendor:intelmodel:compute card cd1p64gkscope: - version: -

Trust: 0.6

vendor:intelmodel:nuc kit nuc6caysscope: - version: -

Trust: 0.6

vendor:intelmodel:nuc kit nuc6i7kykscope: - version: -

Trust: 0.6

vendor:intelmodel:nuc kit nuc6i5syhscope: - version: -

Trust: 0.6

vendor:intelmodel:compute stick stk2mv64ccscope: - version: -

Trust: 0.6

vendor:intelmodel:compute stick stk2m3w64ccscope: - version: -

Trust: 0.6

vendor:intelmodel:nuc mainstream game kitscope:eqversion:8

Trust: 0.6

vendor:intelmodel:nuc mainstream game mini computerscope:eqversion:8

Trust: 0.6

vendor:intelmodel:nuc kit nuc8i7bekscope: - version: -

Trust: 0.6

vendor:intelmodel:nuc home nuc8i3cysmscope:eqversion:8-

Trust: 0.6

vendor:intelmodel:nuc-kit nuc7i7dnkescope: - version: -

Trust: 0.6

vendor:intelmodel:nuc-kit nuc7i5dnkescope: - version: -

Trust: 0.6

vendor:intelmodel:nuc-kit nuc7i3dnhescope: - version: -

Trust: 0.6

vendor:intelmodel:nuc board de3815tybescope: - version: -

Trust: 0.6

vendor:intelmodel:nuc board d34010wybscope: - version: -

Trust: 0.6

vendor:intelmodel:nuc8i7bekscope:eqversion: -

Trust: 0.6

vendor:intelmodel:cd1iv128mkscope:eqversion: -

Trust: 0.6

vendor:intelmodel:nuc6caysscope:eqversion: -

Trust: 0.6

vendor:intelmodel:d34010wybscope:eqversion: -

Trust: 0.6

vendor:intelmodel:nuc6i7kykscope:eqversion: -

Trust: 0.6

vendor:intelmodel:nuc6i5syhscope:eqversion: -

Trust: 0.6

vendor:intelmodel:de3815tybescope:eqversion: -

Trust: 0.6

vendor:intelmodel:cd1m3128mkscope:eqversion: -

Trust: 0.6

vendor:intelmodel:stk2m3w64ccscope:eqversion: -

Trust: 0.6

vendor:intelmodel:nuc7cjyhscope:eqversion: -

Trust: 0.6

sources: CNVD: CNVD-2020-04680 // JVNDB: JVNDB-2019-013795 // CNNVD: CNNVD-201912-579 // NVD: CVE-2019-14609

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-14609
value: MEDIUM

Trust: 1.0

NVD: CVE-2019-14609
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2020-04680
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201912-579
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2019-14609
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2020-04680
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2019-14609
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2019-14609
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-04680 // JVNDB: JVNDB-2019-013795 // CNNVD: CNNVD-201912-579 // NVD: CVE-2019-14609

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2019-013795 // NVD: CVE-2019-14609

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201912-579

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-013795

PATCH

title:INTEL-SA-00323url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html

Trust: 0.8

title:Patch for Intel NUC Input Validation Error Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/200053

Trust: 0.6

title:Multiple Intel Product input verification error vulnerability fixesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=106358

Trust: 0.6

sources: CNVD: CNVD-2020-04680 // JVNDB: JVNDB-2019-013795 // CNNVD: CNNVD-201912-579

EXTERNAL IDS

db:NVDid:CVE-2019-14609

Trust: 3.0

db:JVNid:JVNVU93632155

Trust: 0.8

db:JVNDBid:JVNDB-2019-013795

Trust: 0.8

db:CNVDid:CNVD-2020-04680

Trust: 0.6

db:AUSCERTid:ESB-2019.4655

Trust: 0.6

db:CNNVDid:CNNVD-201912-579

Trust: 0.6

sources: CNVD: CNVD-2020-04680 // JVNDB: JVNDB-2019-013795 // CNNVD: CNNVD-201912-579 // NVD: CVE-2019-14609

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2019-14609

Trust: 2.0

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00323.html

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-14609

Trust: 0.8

url:https://jvn.jp/vu/jvnvu93632155/

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2019.4655/

Trust: 0.6

sources: CNVD: CNVD-2020-04680 // JVNDB: JVNDB-2019-013795 // CNNVD: CNNVD-201912-579 // NVD: CVE-2019-14609

SOURCES

db:CNVDid:CNVD-2020-04680
db:JVNDBid:JVNDB-2019-013795
db:CNNVDid:CNNVD-201912-579
db:NVDid:CVE-2019-14609

LAST UPDATE DATE

2024-11-23T20:35:23.570000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-04680date:2020-02-12T00:00:00
db:JVNDBid:JVNDB-2019-013795date:2020-01-16T00:00:00
db:CNNVDid:CNNVD-201912-579date:2019-12-27T00:00:00
db:NVDid:CVE-2019-14609date:2024-11-21T04:27:01.963

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-04680date:2020-02-12T00:00:00
db:JVNDBid:JVNDB-2019-013795date:2020-01-16T00:00:00
db:CNNVDid:CNNVD-201912-579date:2019-12-12T00:00:00
db:NVDid:CVE-2019-14609date:2019-12-16T20:15:15.290