ID

VAR-202003-0362


CVE

CVE-2020-0526


TITLE

Intel(R) NUC Input verification vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-002968

DESCRIPTION

Improper input validation in firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html. Intel(R) NUC There is an input verification vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Intel NUC Kit is a small desktop computer from Intel Corporation

Trust: 2.16

sources: NVD: CVE-2020-0526 // JVNDB: JVNDB-2020-002968 // CNVD: CNVD-2020-21236

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-21236

AFFECTED PRODUCTS

vendor:intelmodel:nuc kit nuc7i7bnhx1scope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:compute stick stk2m364ccscope:eqversion:ccsklm30.86a.0062

Trust: 1.0

vendor:intelmodel:nuc board d54250wybscope:eqversion:wylpt10h.86a.0054

Trust: 1.0

vendor:intelmodel:nuc kit d34010wykscope:eqversion:wylpt10h.86a.0054

Trust: 1.0

vendor:intelmodel:nuc board nuc7i5dnbescope:eqversion:dnkbli5v.86a.0067

Trust: 1.0

vendor:intelmodel:nuc 7 home a mini pc nuc7i5bnhxfscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g mini pc nuc8i7inhscope:eqversion:inwhl357.0036

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i7dnkescope:eqversion:dnkbli7v.86a.0067

Trust: 1.0

vendor:intelmodel:nuc kit nuc6i5syhscope:eqversion:syskli35.86a.0072

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g kit nuc8i7inhscope:eqversion:inwhl357.0036

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i3ryhsscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnhscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i5ryhsscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:nuc 8 enthusiast pc nuc8i7bekqascope:eqversion:becfl357.86a.0077

Trust: 1.0

vendor:intelmodel:nuc 8 business pc nuc8i7hnkqcscope:eqversion:hnkbli70.86a.0059

Trust: 1.0

vendor:intelmodel:nuc board de3815tybescope:eqversion:tybyt20h.86a.0024

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3dnkescope:eqversion:dnkbli30.86a.0067

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g kit nuc8i5inhscope:eqversion:inwhl357.0036

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7bekscope:eqversion:becfl357.86a.0077

Trust: 1.0

vendor:intelmodel:nuc kit nuc7pjyhscope:eqversion:jyglkcpx.86a.0053

Trust: 1.0

vendor:intelmodel:nuc kit d54250wykscope:eqversion:wylpt10h.86a.0054

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5dnkescope:eqversion:dnkbli5v.86a.0067

Trust: 1.0

vendor:intelmodel:nuc kit nuc6caysscope:eqversion:ayaplcel.86a.0066

Trust: 1.0

vendor:intelmodel:nuc kit nuc6i3sykscope:eqversion:syskli35.86a.0072

Trust: 1.0

vendor:intelmodel:compute stick stk1a32scscope:eqversion:sc0045

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i5rykscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i3myhescope:eqversion:mybdwi30.86a.0057

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i7dnhescope:eqversion:dnkbli7v.86a.0067

Trust: 1.0

vendor:intelmodel:nuc 7 home a mini pc nuc7i5bnkpscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnkscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc board nuc5i3mybescope:eqversion:mybdwi30.86a.0057

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i7bnhscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:compute stick stck1a32wfcscope:eqversion:stck1a32wfc

Trust: 1.0

vendor:intelmodel:nuc kit nuc5cpyhscope:eqversion:pybswcel.86a.0078

Trust: 1.0

vendor:intelmodel:nuc 7 essential pc nuc7cjysalscope:eqversion:jyglkcpx.86a.0053

Trust: 1.0

vendor:intelmodel:nuc board nuc7i7dnbescope:eqversion:dnkbli7v.86a.0067

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i3ryhsnscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:nuc board nuc5i5mybescope:eqversion:mybdwi5v.86a.0056

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7hnkscope:eqversion:hnkbli70.86a.0059

Trust: 1.0

vendor:intelmodel:nuc kit nuc7cjyhscope:eqversion:jyglkcpx.86a.0053

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnhx1scope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc kit nuc5ppyhscope:eqversion:pybswcel.86a.0078

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5dnhescope:eqversion:dnkbli5v.86a.0067

Trust: 1.0

vendor:intelmodel:nuc kit nuc6i3syhscope:eqversion:syskli35.86a.0072

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3bnhx1scope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:compute stick stk1aw32scscope:eqversion:sc0045

Trust: 1.0

vendor:intelmodel:nuc kit d54250wykhscope:eqversion:wylpt10h.86a.0054

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i3dnhescope:eqversion:dnkbli30.86a.0067

Trust: 1.0

vendor:intelmodel:nuc board nuc8cchbscope:eqversion:chaplcel.0047

Trust: 1.0

vendor:intelmodel:nuc 8 home pc nuc8i3cysmscope:eqversion:cycnli35.86a.0044

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i3ryhscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i7ryhscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:nuc kit de3815tykhescope:eqversion:tybyt20h.86a.0024

Trust: 1.0

vendor:intelmodel:nuc kit nuc6cayhscope:eqversion:ayaplcel.86a.0066

Trust: 1.0

vendor:intelmodel:nuc board d34010wybscope:eqversion:wylpt10h.86a.0054

Trust: 1.0

vendor:intelmodel:nuc 7 enthusiast pc nuc7i7bnhxgscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnhscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:compute stick stk2m3w64ccscope:eqversion:ccsklm30.86a.0062

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i5ryhscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:compute stick stck1a8lfcscope:eqversion:stck1a8lfc

Trust: 1.0

vendor:intelmodel:nuc board nuc7i3dnbescope:eqversion:dnkbli30.86a.0067

Trust: 1.0

vendor:intelmodel:nuc kit d34010wykhscope:eqversion:wylpt10h.86a.0054

Trust: 1.0

vendor:intelmodel:nuc kit nuc7i5bnkscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc kit nuc6i7kykscope:eqversion:kyskli70.86a.0066

Trust: 1.0

vendor:intelmodel:nuc 7 home a mini pc nuc7i3bnhxfscope:eqversion:bnkbl357.86a.0081

Trust: 1.0

vendor:intelmodel:nuc kit nuc5pgyhscope:eqversion:pybswcel.86a.0078

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i5myhescope:eqversion:mybdwi5v.86a.0056

Trust: 1.0

vendor:intelmodel:nuc 8 rugged kit nuc8cchkrscope:eqversion:chaplcel.0047

Trust: 1.0

vendor:intelmodel:nuc kit nuc6i5sykscope:eqversion:syskli35.86a.0072

Trust: 1.0

vendor:intelmodel:nuc kit nuc5i3rykscope:eqversion:rybdwi35.86a.0383

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7hnkscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kit nuc8i7bekscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc 8 mainstream-g kit nuc8i5inhscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc 8 rugged kit nuc8cchkrscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc 8 business pc nuc8i7hnkqcscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc 8 home pc nuc8i3cysmscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc board nuc8cchbscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc 8 enthusiast pc nuc8i7bekqascope: - version: -

Trust: 0.8

vendor:intelmodel:nuc 8 mainstream-g mini pc nuc8i7inhscope: - version: -

Trust: 0.8

vendor:intelmodel:nucscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2020-21236 // JVNDB: JVNDB-2020-002968 // NVD: CVE-2020-0526

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-0526
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-002968
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2020-21236
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202003-794
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2020-0526
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-002968
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-21236
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-0526
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-002968
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-21236 // JVNDB: JVNDB-2020-002968 // CNNVD: CNNVD-202003-794 // NVD: CVE-2020-0526

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2020-002968 // NVD: CVE-2020-0526

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202003-794

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202003-794

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-002968

PATCH

title:INTEL-SA-00343url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html

Trust: 0.8

title:Patch for Intel NUC Input Verification Error Vulnerability (CNVD-2020-21236)url:https://www.cnvd.org.cn/patchInfo/show/212391

Trust: 0.6

title:Intel NUC Fixes for access control error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=111926

Trust: 0.6

sources: CNVD: CNVD-2020-21236 // JVNDB: JVNDB-2020-002968 // CNNVD: CNNVD-202003-794

EXTERNAL IDS

db:NVDid:CVE-2020-0526

Trust: 3.0

db:JVNid:JVNVU94445466

Trust: 0.8

db:JVNDBid:JVNDB-2020-002968

Trust: 0.8

db:CNVDid:CNVD-2020-21236

Trust: 0.6

db:CNNVDid:CNNVD-202003-794

Trust: 0.6

sources: CNVD: CNVD-2020-21236 // JVNDB: JVNDB-2020-002968 // CNNVD: CNNVD-202003-794 // NVD: CVE-2020-0526

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2020-0526

Trust: 2.0

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-0526

Trust: 0.8

url:http://jvn.jp/vu/jvnvu94445466/index.html

Trust: 0.8

sources: CNVD: CNVD-2020-21236 // JVNDB: JVNDB-2020-002968 // CNNVD: CNNVD-202003-794 // NVD: CVE-2020-0526

CREDITS

Ruslan Zakirov and Alexander Ermolov

Trust: 0.6

sources: CNNVD: CNNVD-202003-794

SOURCES

db:CNVDid:CNVD-2020-21236
db:JVNDBid:JVNDB-2020-002968
db:CNNVDid:CNNVD-202003-794
db:NVDid:CVE-2020-0526

LAST UPDATE DATE

2024-11-23T20:51:00.594000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-21236date:2020-04-03T00:00:00
db:JVNDBid:JVNDB-2020-002968date:2020-03-31T00:00:00
db:CNNVDid:CNNVD-202003-794date:2021-01-05T00:00:00
db:NVDid:CVE-2020-0526date:2024-11-21T04:53:40.273

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-21236date:2020-04-03T00:00:00
db:JVNDBid:JVNDB-2020-002968date:2020-03-31T00:00:00
db:CNNVDid:CNNVD-202003-794date:2020-03-12T00:00:00
db:NVDid:CVE-2020-0526date:2020-03-12T21:15:13.937