ID

VAR-202003-0346


CVE

CVE-2020-0530


TITLE

Intel(R) NUC Classic buffer overflow vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-002969

DESCRIPTION

Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html. Intel(R) NUC Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Intel NUC Kit is a small desktop computer from Intel Corporation. The firmware in Intel NUC has a privilege escalation vulnerability. The vulnerability stems from the program's failure to properly limit the buffer. A local attacker can use this vulnerability to increase the privilege

Trust: 2.16

sources: NVD: CVE-2020-0530 // JVNDB: JVNDB-2020-002969 // CNVD: CNVD-2020-21234

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-21234

AFFECTED PRODUCTS

vendor:intelmodel:nuc kit nuc7i7bnhx1scope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:compute stick stk2m364ccscope:eqversion:ccsklm30.86a.0062

Trust: 1.0

vendor:intelmodel:nuc board d54250wybscope:eqversion:wylpt10h.86a.0054

Trust: 1.0

vendor:intelmodel:nuc kit d34010wykscope:eqversion:wylpt10h.86a.0054

Trust: 1.0

vendor:intelmodel:nuc board nuc7i5dnbescope:eqversion:dnkbli5v.86a.0067

Trust: 1.0

vendor:intelmodel:nuc 7 home a mini pc nuc7i5bnhxfscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g mini pc nuc8i7inhscope:eqversion:inwhl357.0036

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i7dnkescope:eqversion:dnkbli7v.86a.0067

Trust: 1.0

vendor:intelmodel:nuc kit nuc6i5syhscope:eqversion:syskli35.86a.0072

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g kit nuc8i7inhscope:eqversion:inwhl357.0036

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i3ryhsscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnhscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i5ryhsscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:nuc 8 enthusiast pc nuc8i7bekqascope:eqversion:becfl357.86a.0077

Trust: 1.0

vendor:intelmodel:nuc 8 business pc nuc8i7hnkqcscope:eqversion:hnkbli70.86a.0059

Trust: 1.0

vendor:intelmodel:nuc board de3815tybescope:eqversion:tybyt20h.86a.0024

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3dnkescope:eqversion:dnkbli30.86a.0067

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g kit nuc8i5inhscope:eqversion:inwhl357.0036

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7bekscope:eqversion:becfl357.86a.0077

Trust: 1.0

vendor:intelmodel:nuc kit nuc7pjyhscope:eqversion:jyglkcpx.86a.0053

Trust: 1.0

vendor:intelmodel:nuc kit d54250wykscope:eqversion:wylpt10h.86a.0054

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5dnkescope:eqversion:dnkbli5v.86a.0067

Trust: 1.0

vendor:intelmodel:nuc kit nuc6caysscope:eqversion:ayaplcel.86a.0066

Trust: 1.0

vendor:intelmodel:nuc kit nuc6i3sykscope:eqversion:syskli35.86a.0072

Trust: 1.0

vendor:intelmodel:compute stick stk1a32scscope:eqversion:sc0045

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i5rykscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i3myhescope:eqversion:mybdwi30.86a.0057

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i7dnhescope:eqversion:dnkbli7v.86a.0067

Trust: 1.0

vendor:intelmodel:nuc 7 home a mini pc nuc7i5bnkpscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnkscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc board nuc5i3mybescope:eqversion:mybdwi30.86a.0057

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i7bnhscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:compute stick stck1a32wfcscope:eqversion:stck1a32wfc

Trust: 1.0

vendor:intelmodel:nuc kit nuc5cpyhscope:eqversion:pybswcel.86a.0078

Trust: 1.0

vendor:intelmodel:nuc 7 essential pc nuc7cjysalscope:eqversion:jyglkcpx.86a.0053

Trust: 1.0

vendor:intelmodel:nuc board nuc7i7dnbescope:eqversion:dnkbli7v.86a.0067

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i3ryhsnscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:nuc board nuc5i5mybescope:eqversion:mybdwi5v.86a.0056

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7hnkscope:eqversion:hnkbli70.86a.0059

Trust: 1.0

vendor:intelmodel:nuc kit nuc7cjyhscope:eqversion:jyglkcpx.86a.0053

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnhx1scope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc kit nuc5ppyhscope:eqversion:pybswcel.86a.0078

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5dnhescope:eqversion:dnkbli5v.86a.0067

Trust: 1.0

vendor:intelmodel:nuc kit nuc6i3syhscope:eqversion:syskli35.86a.0072

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnhx1scope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:compute stick stk1aw32scscope:eqversion:sc0045

Trust: 1.0

vendor:intelmodel:nuc kit d54250wykhscope:eqversion:wylpt10h.86a.0054

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3dnhescope:eqversion:dnkbli30.86a.0067

Trust: 1.0

vendor:intelmodel:nuc board nuc8cchbscope:eqversion:chaplcel.0047

Trust: 1.0

vendor:intelmodel:nuc 8 home pc nuc8i3cysmscope:eqversion:cycnli35.86a.0044

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i3ryhscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i7ryhscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:nuc kit de3815tykhescope:eqversion:tybyt20h.86a.0024

Trust: 1.0

vendor:intelmodel:nuc kit nuc6cayhscope:eqversion:ayaplcel.86a.0066

Trust: 1.0

vendor:intelmodel:nuc board d34010wybscope:eqversion:wylpt10h.86a.0054

Trust: 1.0

vendor:intelmodel:nuc 7 enthusiast pc nuc7i7bnhxgscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnhscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:compute stick stk2m3w64ccscope:eqversion:ccsklm30.86a.0062

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i5ryhscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:compute stick stck1a8lfcscope:eqversion:stck1a8lfc

Trust: 1.0

vendor:intelmodel:nuc board nuc7i3dnbescope:eqversion:dnkbli30.86a.0067

Trust: 1.0

vendor:intelmodel:nuc kit d34010wykhscope:eqversion:wylpt10h.86a.0054

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnkscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc kit nuc6i7kykscope:eqversion:kyskli70.86a.0066

Trust: 1.0

vendor:intelmodel:nuc 7 home a mini pc nuc7i3bnhxfscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc kit nuc5pgyhscope:eqversion:pybswcel.86a.0078

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i5myhescope:eqversion:mybdwi5v.86a.0056

Trust: 1.0

vendor:intelmodel:nuc 8 rugged kit nuc8cchkrscope:eqversion:chaplcel.0047

Trust: 1.0

vendor:intelmodel:nuc kit nuc6i5sykscope:eqversion:syskli35.86a.0072

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i3rykscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7hnkscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kit nuc8i7bekscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc 8 mainstream-g kit nuc8i5inhscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc 8 rugged kit nuc8cchkrscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc 8 business pc nuc8i7hnkqcscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc 8 home pc nuc8i3cysmscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc board nuc8cchbscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc 8 enthusiast pc nuc8i7bekqascope: - version: -

Trust: 0.8

vendor:intelmodel:nuc 8 mainstream-g mini pc nuc8i7inhscope: - version: -

Trust: 0.8

vendor:intelmodel:nucscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2020-21234 // JVNDB: JVNDB-2020-002969 // NVD: CVE-2020-0530

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-0530
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-002969
value: HIGH

Trust: 0.8

CNVD: CNVD-2020-21234
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202003-796
value: HIGH

Trust: 0.6

nvd@nist.gov: CVE-2020-0530
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-002969
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-21234
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-0530
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-002969
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-21234 // JVNDB: JVNDB-2020-002969 // CNNVD: CNNVD-202003-796 // NVD: CVE-2020-0530

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.8

sources: JVNDB: JVNDB-2020-002969 // NVD: CVE-2020-0530

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202003-796

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202003-796

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-002969

PATCH

title:INTEL-SA-00343url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html

Trust: 0.8

title:Patch for Intel NUC Privilege Elevation Vulnerability (CNVD-2020-21234)url:https://www.cnvd.org.cn/patchInfo/show/212389

Trust: 0.6

title:Intel NUC Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=111928

Trust: 0.6

sources: CNVD: CNVD-2020-21234 // JVNDB: JVNDB-2020-002969 // CNNVD: CNNVD-202003-796

EXTERNAL IDS

db:NVDid:CVE-2020-0530

Trust: 3.0

db:JVNid:JVNVU94445466

Trust: 0.8

db:JVNDBid:JVNDB-2020-002969

Trust: 0.8

db:CNVDid:CNVD-2020-21234

Trust: 0.6

db:CNNVDid:CNNVD-202003-796

Trust: 0.6

sources: CNVD: CNVD-2020-21234 // JVNDB: JVNDB-2020-002969 // CNNVD: CNNVD-202003-796 // NVD: CVE-2020-0530

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2020-0530

Trust: 2.0

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-0530

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94445466/index.html

Trust: 0.8

sources: CNVD: CNVD-2020-21234 // JVNDB: JVNDB-2020-002969 // CNNVD: CNNVD-202003-796 // NVD: CVE-2020-0530

CREDITS

Alexander Ermolov and Dmitry Frolov

Trust: 0.6

sources: CNNVD: CNNVD-202003-796

SOURCES

db:CNVDid:CNVD-2020-21234
db:JVNDBid:JVNDB-2020-002969
db:CNNVDid:CNNVD-202003-796
db:NVDid:CVE-2020-0530

LAST UPDATE DATE

2024-11-23T21:10:18.847000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-21234date:2020-04-03T00:00:00
db:JVNDBid:JVNDB-2020-002969date:2020-03-31T00:00:00
db:CNNVDid:CNNVD-202003-796date:2020-04-01T00:00:00
db:NVDid:CVE-2020-0530date:2024-11-21T04:53:40.883

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-21234date:2020-04-03T00:00:00
db:JVNDBid:JVNDB-2020-002969date:2020-03-31T00:00:00
db:CNNVDid:CNNVD-202003-796date:2020-03-12T00:00:00
db:NVDid:CVE-2020-0530date:2020-03-12T21:15:14.017