ID

VAR-202006-0025


CVE

CVE-2020-0595


TITLE

Treck IP stacks contain multiple vulnerabilities

Trust: 0.8

sources: CERT/CC: VU#257161

DESCRIPTION

Use after free in IPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable escalation of privilege via network access. Treck IP stack implementations for embedded systems are affected by multiple vulnerabilities. This set of vulnerabilities was researched and reported by JSOF, who calls them Ripple20.CVE-2020-0594 Unknown CVE-2020-0595 Unknown CVE-2020-0597 Unknown CVE-2020-11896 Affected CVE-2020-11897 Not Affected CVE-2020-11898 Affected CVE-2020-11899 Not Affected CVE-2020-11900 Affected CVE-2020-11901 Not Affected CVE-2020-11902 Not Affected CVE-2020-11903 Not Affected CVE-2020-11904 Not Affected CVE-2020-11905 Not Affected CVE-2020-11906 Affected CVE-2020-11907 Affected CVE-2020-11908 Not Affected CVE-2020-11909 Not Affected CVE-2020-11910 Not Affected CVE-2020-11911 Affected CVE-2020-11912 Affected CVE-2020-11913 Not Affected CVE-2020-11914 Affected CVE-2020-8674 UnknownCVE-2020-0594 Unknown CVE-2020-0595 Unknown CVE-2020-0597 Unknown CVE-2020-11896 Affected CVE-2020-11897 Not Affected CVE-2020-11898 Affected CVE-2020-11899 Not Affected CVE-2020-11900 Affected CVE-2020-11901 Not Affected CVE-2020-11902 Not Affected CVE-2020-11903 Not Affected CVE-2020-11904 Not Affected CVE-2020-11905 Not Affected CVE-2020-11906 Affected CVE-2020-11907 Affected CVE-2020-11908 Not Affected CVE-2020-11909 Not Affected CVE-2020-11910 Not Affected CVE-2020-11911 Affected CVE-2020-11912 Affected CVE-2020-11913 Not Affected CVE-2020-11914 Affected CVE-2020-8674 Unknown. Intel(R) AMT and ISM Is vulnerable to the use of freed memory.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Both Intel Active Management Technology (AMT) and Intel Software Manager (ISM) are products of Intel Corporation of the United States. Intel Active Management Technology is a set of hardware-based computer remote active management technology software. Intel Software Manager is a utility for managing Intel software development products. A resource management error vulnerability exists in the IPv6 subsystem in Intel AMT and ISM. A remote attacker could exploit this vulnerability to elevate privileges. The following products and versions are affected: Intel AMT before 11.8.77, before 11.12.77, before 11.22.77, before 12.0.64; ISM before 11.8.77, before 11.12.77, before 11.22.77 Version, version before 12.0.64

Trust: 2.43

sources: NVD: CVE-2020-0595 // CERT/CC: VU#257161 // JVNDB: JVNDB-2020-006817 // VULHUB: VHN-162029

AFFECTED PRODUCTS

vendor:intelmodel:service managerscope:ltversion:11.12.77

Trust: 1.0

vendor:intelmodel:service managerscope:ltversion:11.22.77

Trust: 1.0

vendor:intelmodel:service managerscope:gteversion:11.0

Trust: 1.0

vendor:intelmodel:active management technologyscope:gteversion:11.20

Trust: 1.0

vendor:intelmodel:active management technologyscope:gteversion:12.0

Trust: 1.0

vendor:intelmodel:service managerscope:ltversion:11.8.77

Trust: 1.0

vendor:intelmodel:service managerscope:ltversion:12.0.64

Trust: 1.0

vendor:intelmodel:active management technologyscope:gteversion:11.0

Trust: 1.0

vendor:intelmodel:service managerscope:gteversion:11.10

Trust: 1.0

vendor:intelmodel:active management technologyscope:ltversion:11.22.77

Trust: 1.0

vendor:intelmodel:active management technologyscope:ltversion:11.8.77

Trust: 1.0

vendor:intelmodel:active management technologyscope:ltversion:12.0.64

Trust: 1.0

vendor:intelmodel:service managerscope:gteversion:12.0

Trust: 1.0

vendor:intelmodel:service managerscope:gteversion:11.20

Trust: 1.0

vendor:intelmodel:active management technologyscope:gteversion:11.10

Trust: 1.0

vendor:intelmodel:active management technologyscope:ltversion:11.12.77

Trust: 1.0

vendor:intelmodel:active management technologyscope:eqversion:11.12.77

Trust: 0.8

vendor:intelmodel:active management technologyscope:eqversion:11.22.77

Trust: 0.8

vendor:intelmodel:active management technologyscope:eqversion:11.8.77

Trust: 0.8

vendor:intelmodel:active management technologyscope:eqversion:12.0.64

Trust: 0.8

vendor:intelmodel:standard manageabilityscope:eqversion:11.12.77

Trust: 0.8

vendor:intelmodel:standard manageabilityscope:eqversion:11.22.77

Trust: 0.8

vendor:intelmodel:standard manageabilityscope:eqversion:11.8.77

Trust: 0.8

vendor:intelmodel:standard manageabilityscope:eqversion:12.0.64

Trust: 0.8

sources: JVNDB: JVNDB-2020-006817 // NVD: CVE-2020-0595

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-0595
value: CRITICAL

Trust: 1.0

NVD: JVNDB-2020-006817
value: CRITICAL

Trust: 0.8

CNNVD: CNNVD-202006-799
value: CRITICAL

Trust: 0.6

VULHUB: VHN-162029
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2020-0595
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-006817
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-162029
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-0595
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-006817
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-162029 // JVNDB: JVNDB-2020-006817 // CNNVD: CNNVD-202006-799 // NVD: CVE-2020-0595

PROBLEMTYPE DATA

problemtype:CWE-416

Trust: 1.9

sources: VULHUB: VHN-162029 // JVNDB: JVNDB-2020-006817 // NVD: CVE-2020-0595

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202006-799

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-202006-799

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-006817

PATCH

title:INTEL-SA-00295url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html

Trust: 0.8

title:Intel AMT and ISM Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=121693

Trust: 0.6

sources: JVNDB: JVNDB-2020-006817 // CNNVD: CNNVD-202006-799

EXTERNAL IDS

db:NVDid:CVE-2020-0595

Trust: 3.3

db:CERT/CCid:VU#257161

Trust: 2.5

db:LENOVOid:LEN-30041

Trust: 1.7

db:JVNid:JVNVU98979613

Trust: 0.8

db:JVNDBid:JVNDB-2020-006817

Trust: 0.8

db:CNNVDid:CNNVD-202006-799

Trust: 0.7

db:AUSCERTid:ESB-2020.1991

Trust: 0.6

db:AUSCERTid:ESB-2020.1991.2

Trust: 0.6

db:VULHUBid:VHN-162029

Trust: 0.1

sources: CERT/CC: VU#257161 // VULHUB: VHN-162029 // JVNDB: JVNDB-2020-006817 // CNNVD: CNNVD-202006-799 // NVD: CVE-2020-0595

REFERENCES

url:https://www.kb.cert.org/vuls/id/257161

Trust: 1.7

url:https://security.netapp.com/advisory/ntap-20200611-0007/

Trust: 1.7

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html

Trust: 1.7

url:https://www.synology.com/security/advisory/synology_sa_20_15

Trust: 1.7

url:https://support.lenovo.com/de/en/product_security/len-30041

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-0595

Trust: 1.4

url:cve-2020-0594

Trust: 0.8

url:cve-2020-0595

Trust: 0.8

url:cve-2020-0597

Trust: 0.8

url:cve-2020-11896

Trust: 0.8

url:cve-2020-11897

Trust: 0.8

url:cve-2020-11898

Trust: 0.8

url:cve-2020-11899

Trust: 0.8

url:cve-2020-11900

Trust: 0.8

url:cve-2020-11901

Trust: 0.8

url:cve-2020-11902

Trust: 0.8

url:cve-2020-11903

Trust: 0.8

url:cve-2020-11904

Trust: 0.8

url:cve-2020-11905

Trust: 0.8

url:cve-2020-11906

Trust: 0.8

url:cve-2020-11907

Trust: 0.8

url:cve-2020-11908

Trust: 0.8

url:cve-2020-11909

Trust: 0.8

url:cve-2020-11910

Trust: 0.8

url:cve-2020-11911

Trust: 0.8

url:cve-2020-11912

Trust: 0.8

url:cve-2020-11913

Trust: 0.8

url:cve-2020-11914

Trust: 0.8

url:cve-2020-8674

Trust: 0.8

url:vince json

Trust: 0.8

url:csaf

Trust: 0.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-0595

Trust: 0.8

url:https://jvn.jp/vu/jvnvu98979613/

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.1991/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.1991.2/

Trust: 0.6

url:https://vigilance.fr/vulnerability/intel-csme-sps-txe-amt-ism-dal-multiple-vulnerabilities-32545

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-30041

Trust: 0.6

sources: CERT/CC: VU#257161 // VULHUB: VHN-162029 // JVNDB: JVNDB-2020-006817 // CNNVD: CNNVD-202006-799 // NVD: CVE-2020-0595

CREDITS

This document was written by Vijay Sarvepalli.

Trust: 0.8

sources: CERT/CC: VU#257161

SOURCES

db:CERT/CCid:VU#257161
db:VULHUBid:VHN-162029
db:JVNDBid:JVNDB-2020-006817
db:CNNVDid:CNNVD-202006-799
db:NVDid:CVE-2020-0595

LAST UPDATE DATE

2024-11-23T19:32:49.588000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#257161date:2022-09-20T00:00:00
db:VULHUBid:VHN-162029date:2021-03-18T00:00:00
db:JVNDBid:JVNDB-2020-006817date:2020-07-20T00:00:00
db:CNNVDid:CNNVD-202006-799date:2021-05-24T00:00:00
db:NVDid:CVE-2020-0595date:2024-11-21T04:53:49.383

SOURCES RELEASE DATE

db:CERT/CCid:VU#257161date:2020-06-16T00:00:00
db:VULHUBid:VHN-162029date:2020-06-15T00:00:00
db:JVNDBid:JVNDB-2020-006817date:2020-07-20T00:00:00
db:CNNVDid:CNNVD-202006-799date:2020-06-09T00:00:00
db:NVDid:CVE-2020-0595date:2020-06-15T14:15:11.517