ID

VAR-202008-0073


CVE

CVE-2020-0559


TITLE

plural Intel(R) PROSet/Wireless WiFi Inappropriate default permissions in the product

Trust: 0.8

sources: JVNDB: JVNDB-2020-009530

DESCRIPTION

Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access. plural Intel(R) PROSet/Wireless WiFi The product contains a vulnerability related to improper default permissions.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Intel PROSet/Wireless WiFi Software is a wireless network card driver of Intel Corporation. A security vulnerability exists in Intel PROSet/Wireless WiFi (Windows 7 and 8.1). An attacker could exploit this vulnerability to elevate privileges. The following products and versions are affected: Intel Wi-Fi 6 AX201 before 21.40.5.1; Wi-Fi 6 AX200 before 21.40.5.1; Wireless-AC 9560 before 21.40.5.1; Wireless-AC 9462 before 21.40.5.1; Wireless-AC 9461 prior to 21.40.5.1; Wireless-AC 9260 prior to 21.40.5.1; Dual Band Wireless-AC 8265 prior to 21.40.5.1; Dual Band Wireless-AC 8260 prior to 21.40.5.1; Dual Band Wireless-AC 3168 Prior to 21.40.5.1; Wireless 7265 (Rev D) Family prior to 21.40.5.1; Dual Band Wireless-AC 3165 prior to 21.40.5.1

Trust: 1.71

sources: NVD: CVE-2020-0559 // JVNDB: JVNDB-2020-009530 // VULHUB: VHN-161993

AFFECTED PRODUCTS

vendor:intelmodel:celeron n2808scope:eqversion: -

Trust: 1.0

vendor:intelmodel:ac 7265scope:ltversion:21.40.5.1

Trust: 1.0

vendor:intelmodel:ac 9260scope:ltversion:21.40.5.1

Trust: 1.0

vendor:intelmodel:celeron n3000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium n3700scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j4005scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n2805scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium j3710scope:eqversion: -

Trust: 1.0

vendor:intelmodel:ax201scope:ltversion:21.40.5.1

Trust: 1.0

vendor:intelmodel:celeron n3160scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n6210scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium n4200scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4505scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium j2850scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n2815scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j3455escope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium j2900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium j4205scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n3350escope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n2806scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n3350scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j3355scope:eqversion: -

Trust: 1.0

vendor:intelmodel:ac 3165scope:ltversion:21.40.5.1

Trust: 1.0

vendor:intelmodel:celeron j3455scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x5-e3940scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j1900scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4000scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n2920scope:eqversion: -

Trust: 1.0

vendor:intelmodel:ac 8265scope:ltversion:21.40.5.1

Trust: 1.0

vendor:intelmodel:celeron n2930scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4020scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n3060scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j4105scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n2830scope:eqversion: -

Trust: 1.0

vendor:intelmodel:ac 9462scope:ltversion:21.40.5.1

Trust: 1.0

vendor:intelmodel:celeron n2807scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n3050scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n3450scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j4125scope:eqversion: -

Trust: 1.0

vendor:intelmodel:ac 8260scope:ltversion:21.40.5.1

Trust: 1.0

vendor:intelmodel:celeron j6413scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium n3520scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j6412scope:eqversion: -

Trust: 1.0

vendor:intelmodel:ac 9560scope:ltversion:21.40.5.1

Trust: 1.0

vendor:intelmodel:celeron n2940scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n2840scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n6211scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j3060scope:eqversion: -

Trust: 1.0

vendor:intelmodel:ac 3168scope:ltversion:21.40.5.1

Trust: 1.0

vendor:intelmodel:celeron j1750scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium n3710scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n3010scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x5-e3930scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium n3510scope:eqversion: -

Trust: 1.0

vendor:intelmodel:atom x7-e3950scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n2810scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n2820scope:eqversion: -

Trust: 1.0

vendor:intelmodel:ax200scope:ltversion:21.40.5.1

Trust: 1.0

vendor:intelmodel:celeron n2910scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium n3530scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4120scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n5100scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n5105scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j3160scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n4500scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron n3150scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium n3540scope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium j6426scope:eqversion: -

Trust: 1.0

vendor:intelmodel:ac 9461scope:ltversion:21.40.5.1

Trust: 1.0

vendor:intelmodel:pentium n4200escope:eqversion: -

Trust: 1.0

vendor:intelmodel:pentium n6415scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j3355escope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j1850scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j4025scope:eqversion: -

Trust: 1.0

vendor:intelmodel:celeron j1800scope:eqversion: -

Trust: 1.0

vendor:intelmodel:ac 3165scope:eqversion:21.40.5.1

Trust: 0.8

vendor:intelmodel:ac 3168scope:eqversion:21.40.5.1

Trust: 0.8

vendor:intelmodel:ac 7265scope:eqversion:21.40.5.1

Trust: 0.8

vendor:intelmodel:ac 8260scope:eqversion:21.40.5.1

Trust: 0.8

vendor:intelmodel:ac 8265scope:eqversion:21.40.5.1

Trust: 0.8

vendor:intelmodel:ac 9260scope:eqversion:21.40.5.1

Trust: 0.8

vendor:intelmodel:ac 9461scope:eqversion:21.40.5.1

Trust: 0.8

vendor:intelmodel:ac 9462scope:eqversion:21.40.5.1

Trust: 0.8

vendor:intelmodel:ac 9560scope:eqversion:21.40.5.1

Trust: 0.8

vendor:intelmodel:ax200scope:eqversion:21.40.5.1

Trust: 0.8

vendor:intelmodel:ax201scope:eqversion:21.40.5.1

Trust: 0.8

sources: JVNDB: JVNDB-2020-009530 // NVD: CVE-2020-0559

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-0559
value: HIGH

Trust: 1.0

NVD: JVNDB-2020-009530
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202008-582
value: HIGH

Trust: 0.6

VULHUB: VHN-161993
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-0559
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-009530
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-161993
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-0559
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-009530
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-161993 // JVNDB: JVNDB-2020-009530 // CNNVD: CNNVD-202008-582 // NVD: CVE-2020-0559

PROBLEMTYPE DATA

problemtype:CWE-732

Trust: 1.1

problemtype:CWE-276

Trust: 0.9

sources: VULHUB: VHN-161993 // JVNDB: JVNDB-2020-009530 // NVD: CVE-2020-0559

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202008-582

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202008-582

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-009530

PATCH

title:INTEL-SA-00355url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html

Trust: 0.8

title:Intel PROSet/Wireless WiFi Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=126448

Trust: 0.6

sources: JVNDB: JVNDB-2020-009530 // CNNVD: CNNVD-202008-582

EXTERNAL IDS

db:NVDid:CVE-2020-0559

Trust: 2.5

db:JVNid:JVNVU99606488

Trust: 0.8

db:JVNDBid:JVNDB-2020-009530

Trust: 0.8

db:CNNVDid:CNNVD-202008-582

Trust: 0.7

db:AUSCERTid:ESB-2020.3988

Trust: 0.6

db:AUSCERTid:ESB-2020.2771

Trust: 0.6

db:LENOVOid:LEN-36230

Trust: 0.6

db:VULHUBid:VHN-161993

Trust: 0.1

sources: VULHUB: VHN-161993 // JVNDB: JVNDB-2020-009530 // CNNVD: CNNVD-202008-582 // NVD: CVE-2020-0559

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html

Trust: 1.7

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-0559

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-0559

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99606488/

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.3988/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2020.2771/

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-36230

Trust: 0.6

sources: VULHUB: VHN-161993 // JVNDB: JVNDB-2020-009530 // CNNVD: CNNVD-202008-582 // NVD: CVE-2020-0559

CREDITS

Marius Gabriel Mihai

Trust: 0.6

sources: CNNVD: CNNVD-202008-582

SOURCES

db:VULHUBid:VHN-161993
db:JVNDBid:JVNDB-2020-009530
db:CNNVDid:CNNVD-202008-582
db:NVDid:CVE-2020-0559

LAST UPDATE DATE

2024-11-23T21:35:21.172000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-161993date:2022-04-28T00:00:00
db:JVNDBid:JVNDB-2020-009530date:2020-11-10T08:48:42
db:CNNVDid:CNNVD-202008-582date:2022-04-29T00:00:00
db:NVDid:CVE-2020-0559date:2024-11-21T04:53:45.603

SOURCES RELEASE DATE

db:VULHUBid:VHN-161993date:2020-08-13T00:00:00
db:JVNDBid:JVNDB-2020-009530date:2020-11-10T08:48:42
db:CNNVDid:CNNVD-202008-582date:2020-08-11T00:00:00
db:NVDid:CVE-2020-0559date:2020-08-13T04:15:12.913