ID

VAR-202002-0192


CVE

CVE-2020-0564


TITLE

Windows for Intel(R) RWC3 Vulnerability regarding improper default permissions in

Trust: 0.8

sources: JVNDB: JVNDB-2020-002162

DESCRIPTION

Improper permissions in the installer for Intel(R) RWC3 for Windows before version 7.010.009.000 may allow an authenticated user to potentially enable escalation of privilege via local access. Windows for Intel(R) RWC3 There is a vulnerability in improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. There is a security vulnerability in the installer of Intel(R) RWC3 on Windows platform. A local attacker could exploit this vulnerability to elevate privileges

Trust: 1.8

sources: NVD: CVE-2020-0564 // JVNDB: JVNDB-2020-002162 // VULHUB: VHN-161998 // VULMON: CVE-2020-0564

AFFECTED PRODUCTS

vendor:intelmodel:raid web console 3scope:ltversion:7.010.009.000

Trust: 1.0

vendor:intelmodel:raid web console v3scope:eqversion:7.010.009.000

Trust: 0.8

sources: JVNDB: JVNDB-2020-002162 // NVD: CVE-2020-0564

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-0564
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-002162
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202002-755
value: HIGH

Trust: 0.6

VULHUB: VHN-161998
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-0564
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-0564
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: JVNDB-2020-002162
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-161998
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-0564
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-002162
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-161998 // VULMON: CVE-2020-0564 // JVNDB: JVNDB-2020-002162 // CNNVD: CNNVD-202002-755 // NVD: CVE-2020-0564

PROBLEMTYPE DATA

problemtype:CWE-276

Trust: 1.9

sources: VULHUB: VHN-161998 // JVNDB: JVNDB-2020-002162 // NVD: CVE-2020-0564

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202002-755

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202002-755

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-002162

PATCH

title:INTEL-SA-00341url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00341.html

Trust: 0.8

title:Intel(R) RWC3 Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=108854

Trust: 0.6

title:Threatposturl:https://threatpost.com/intel-patches-high-severity-flaw-in-security-engine/152794/

Trust: 0.1

sources: VULMON: CVE-2020-0564 // JVNDB: JVNDB-2020-002162 // CNNVD: CNNVD-202002-755

EXTERNAL IDS

db:NVDid:CVE-2020-0564

Trust: 2.6

db:JVNid:JVNVU96221887

Trust: 0.8

db:JVNDBid:JVNDB-2020-002162

Trust: 0.8

db:CNNVDid:CNNVD-202002-755

Trust: 0.7

db:AUSCERTid:ESB-2020.0501

Trust: 0.6

db:VULHUBid:VHN-161998

Trust: 0.1

db:VULMONid:CVE-2020-0564

Trust: 0.1

sources: VULHUB: VHN-161998 // VULMON: CVE-2020-0564 // JVNDB: JVNDB-2020-002162 // CNNVD: CNNVD-202002-755 // NVD: CVE-2020-0564

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00341.html

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-0564

Trust: 0.8

url:https://jvn.jp/vu/jvnvu96221887/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-0564

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.0501/

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/276.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/intel-patches-high-severity-flaw-in-security-engine/152794/

Trust: 0.1

sources: VULHUB: VHN-161998 // VULMON: CVE-2020-0564 // JVNDB: JVNDB-2020-002162 // CNNVD: CNNVD-202002-755 // NVD: CVE-2020-0564

SOURCES

db:VULHUBid:VHN-161998
db:VULMONid:CVE-2020-0564
db:JVNDBid:JVNDB-2020-002162
db:CNNVDid:CNNVD-202002-755
db:NVDid:CVE-2020-0564

LAST UPDATE DATE

2024-11-23T20:47:11.407000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-161998date:2020-02-24T00:00:00
db:VULMONid:CVE-2020-0564date:2020-02-24T00:00:00
db:JVNDBid:JVNDB-2020-002162date:2020-03-05T00:00:00
db:CNNVDid:CNNVD-202002-755date:2021-01-05T00:00:00
db:NVDid:CVE-2020-0564date:2024-11-21T04:53:46.163

SOURCES RELEASE DATE

db:VULHUBid:VHN-161998date:2020-02-13T00:00:00
db:VULMONid:CVE-2020-0564date:2020-02-13T00:00:00
db:JVNDBid:JVNDB-2020-002162date:2020-03-05T00:00:00
db:CNNVDid:CNNVD-202002-755date:2020-02-13T00:00:00
db:NVDid:CVE-2020-0564date:2020-02-13T19:15:14.097