ID

VAR-202008-1142


CVE

CVE-2020-8742


TITLE

Intel(R) NUC Input verification vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-009510

DESCRIPTION

Improper input validation in the firmware for Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. Intel(R) NUC There is an input verification vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state

Trust: 1.62

sources: NVD: CVE-2020-8742 // JVNDB: JVNDB-2020-009510

AFFECTED PRODUCTS

vendor:intelmodel:nuc8i3behsscope:ltversion:becfl357.86a

Trust: 1.0

vendor:intelmodel:de3815tybescope:ltversion:tybyt20h.86a

Trust: 1.0

vendor:intelmodel:nuc5pgyhscope:ltversion:pybswcel.86a

Trust: 1.0

vendor:intelmodel:nuc8i5behsscope:ltversion:becfl357.86a

Trust: 1.0

vendor:intelmodel:nuc7i5bnkpscope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:nuc8i5bekpascope:ltversion:becfl357.86a

Trust: 1.0

vendor:intelmodel:nuc8i3bekscope:ltversion:becfl357.86a

Trust: 1.0

vendor:intelmodel:nuc7i5bnkscope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:nuc7pjyhscope:ltversion:jyglkcpx.86a

Trust: 1.0

vendor:intelmodel:nuc8i7behgascope:ltversion:becfl357.86a

Trust: 1.0

vendor:intelmodel:nuc5i3ryhsscope:ltversion:pybswcel.86a

Trust: 1.0

vendor:intelmodel:nuc7i5bnbscope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:nuc5i3ryhscope:ltversion:pybswcel.86a

Trust: 1.0

vendor:intelmodel:nuc5i3ryhsnscope:ltversion:pybswcel.86a

Trust: 1.0

vendor:intelmodel:nuc8i7behscope:ltversion:becfl357.86a

Trust: 1.0

vendor:intelmodel:nuc5i5rykscope:ltversion:pybswcel.86a

Trust: 1.0

vendor:intelmodel:nuc7i3dnktcscope:ltversion:dnkbli30.86a

Trust: 1.0

vendor:intelmodel:nuc7i7bnhx1scope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:nuc8i5behfascope:ltversion:becfl357.86a

Trust: 1.0

vendor:intelmodel:nuc7cjyhscope:ltversion:jyglkcpx.86a

Trust: 1.0

vendor:intelmodel:nuc5i5mybescope:ltversion:mybdwi5v.86a

Trust: 1.0

vendor:intelmodel:cd1c32gkscope:ltversion:gkaplcpx.86a

Trust: 1.0

vendor:intelmodel:nuc8i7hvkvascope:ltversion:hnkbli70.86a

Trust: 1.0

vendor:intelmodel:de3815tykhescope:ltversion:tybyt20h.86a

Trust: 1.0

vendor:intelmodel:nuc8i7bekscope:ltversion:becfl357.86a

Trust: 1.0

vendor:intelmodel:nuc7i7dnbescope:ltversion:dnkbli7v.86a

Trust: 1.0

vendor:intelmodel:nuc7i5dnkescope:ltversion:dnkbli5v.86a

Trust: 1.0

vendor:intelmodel:cd1p64gkscope:ltversion:gkaplcpx.86a

Trust: 1.0

vendor:intelmodel:nuc7i7dnhescope:ltversion:dnkbli7v.86a

Trust: 1.0

vendor:intelmodel:nuc7i3dnhncscope:ltversion:dnkbli30.86a

Trust: 1.0

vendor:intelmodel:nuc7i3dnhescope:ltversion:dnkbli30.86a

Trust: 1.0

vendor:intelmodel:nuc7i3bnhxfscope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:nuc7i3bnkscope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:nuc7i7bnhscope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:de3815tybescope:ltversion:tybyt10h.86a

Trust: 1.0

vendor:intelmodel:nuc8i7bekqascope:ltversion:becfl357.86a

Trust: 1.0

vendor:intelmodel:nuc5i3rykscope:ltversion:pybswcel.86a

Trust: 1.0

vendor:intelmodel:nuc5i5myhescope:ltversion:mybdwi5v.86a

Trust: 1.0

vendor:intelmodel:nuc6i7kykscope:ltversion:kyskli70.86a

Trust: 1.0

vendor:intelmodel:nuc5i3mybescope:ltversion:mybdwi5v.86a

Trust: 1.0

vendor:intelmodel:nuc5i7ryhscope:ltversion:pybswcel.86a

Trust: 1.0

vendor:intelmodel:nuc7i5bnhxfscope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:nuc7i7bnbscope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:nuc8i7hnkscope:ltversion:hnkbli70.86a

Trust: 1.0

vendor:intelmodel:nuc7i5dnbescope:ltversion:dnkbli5v.86a

Trust: 1.0

vendor:intelmodel:nuc8i3behscope:ltversion:becfl357.86a

Trust: 1.0

vendor:intelmodel:nuc8i5behscope:ltversion:becfl357.86a

Trust: 1.0

vendor:intelmodel:nuc8i7hnkqcscope:ltversion:hnkbli70.86a

Trust: 1.0

vendor:intelmodel:nuc7i7dnkescope:ltversion:dnkbli7v.86a

Trust: 1.0

vendor:intelmodel:nuc7i5bnhx1scope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:nuc5i3myhescope:ltversion:mybdwi5v.86a

Trust: 1.0

vendor:intelmodel:nuc7i5bnhscope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:nuc8i3behfascope:ltversion:becfl357.86a

Trust: 1.0

vendor:intelmodel:cd1c64gkscope:ltversion:gkaplcpx.86a

Trust: 1.0

vendor:intelmodel:nuc8i5bekscope:ltversion:becfl357.86a

Trust: 1.0

vendor:intelmodel:nuc7i3dnbescope:ltversion:dnkbli30.86a

Trust: 1.0

vendor:intelmodel:de3815tykhescope:ltversion:tybyt10h.86a

Trust: 1.0

vendor:intelmodel:nuc5cpyhscope:ltversion:pybswcel.86a

Trust: 1.0

vendor:intelmodel:nuc7i3bnhx1scope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:nuc7i3bnbscope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:nuc5i5ryhsscope:ltversion:pybswcel.86a

Trust: 1.0

vendor:intelmodel:nuc5i5ryhscope:ltversion:pybswcel.86a

Trust: 1.0

vendor:intelmodel:nuc7i7bnkqscope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:stk2mv64ccscope:ltversion:ccsklm5v.86a

Trust: 1.0

vendor:intelmodel:nuc7cjysalscope:ltversion:jyglkcpx.86a

Trust: 1.0

vendor:intelmodel:nuc6cayhscope:ltversion:ayaplcel.86a

Trust: 1.0

vendor:intelmodel:nuc7i3bnhscope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:nuc6caysscope:ltversion:ayaplcel.86a

Trust: 1.0

vendor:intelmodel:nuc7i5dnkpcscope:ltversion:dnkbli5v.86a

Trust: 1.0

vendor:intelmodel:nuc7i7bnhxgscope:ltversion:bnkbl357.86a

Trust: 1.0

vendor:intelmodel:nuc8i7hvkscope:ltversion:hnkbli70.86a

Trust: 1.0

vendor:intelmodel:nuc8i7hvkvawscope:ltversion:hnkbli70.86a

Trust: 1.0

vendor:intelmodel:nuc7i5dnhescope:ltversion:dnkbli5v.86a

Trust: 1.0

vendor:intelmodel:nuc7i3dnkescope:ltversion:dnkbli30.86a

Trust: 1.0

vendor:intelmodel:nuc5ppyhscope:ltversion:pybswcel.86a

Trust: 1.0

vendor:intelmodel:nuc8i3behscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc8i3behfascope: - version: -

Trust: 0.8

vendor:intelmodel:nuc8i3behsscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc8i3bekscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc8i5behscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc8i5behfascope: - version: -

Trust: 0.8

vendor:intelmodel:nuc8i5behsscope: - version: -

Trust: 0.8

vendor:intelmodel:nuc8i5bekpascope: - version: -

Trust: 0.8

vendor:intelmodel:nuc8i7behgascope: - version: -

Trust: 0.8

vendor:intelmodel:nuc8i7bekqascope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-009510 // NVD: CVE-2020-8742

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-8742
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-009510
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202008-641
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2020-8742
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-009510
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

nvd@nist.gov: CVE-2020-8742
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-009510
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-009510 // CNNVD: CNNVD-202008-641 // NVD: CVE-2020-8742

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.8

sources: JVNDB: JVNDB-2020-009510 // NVD: CVE-2020-8742

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202008-641

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202008-641

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-009510

PATCH

title:INTEL-SA-00392url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00392.html

Trust: 0.8

title:Intel NUCs Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=126486

Trust: 0.6

sources: JVNDB: JVNDB-2020-009510 // CNNVD: CNNVD-202008-641

EXTERNAL IDS

db:NVDid:CVE-2020-8742

Trust: 2.4

db:JVNid:JVNVU99606488

Trust: 0.8

db:JVNDBid:JVNDB-2020-009510

Trust: 0.8

db:AUSCERTid:ESB-2020.2765

Trust: 0.6

db:CNNVDid:CNNVD-202008-641

Trust: 0.6

sources: JVNDB: JVNDB-2020-009510 // CNNVD: CNNVD-202008-641 // NVD: CVE-2020-8742

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00392.html

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-8742

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-8742

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99606488

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.2765/

Trust: 0.6

sources: JVNDB: JVNDB-2020-009510 // CNNVD: CNNVD-202008-641 // NVD: CVE-2020-8742

SOURCES

db:JVNDBid:JVNDB-2020-009510
db:CNNVDid:CNNVD-202008-641
db:NVDid:CVE-2020-8742

LAST UPDATE DATE

2024-11-23T21:35:21.789000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2020-009510date:2020-11-10T07:39:51
db:CNNVDid:CNNVD-202008-641date:2021-01-05T00:00:00
db:NVDid:CVE-2020-8742date:2024-11-21T05:39:21.850

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2020-009510date:2020-11-10T07:39:51
db:CNNVDid:CNNVD-202008-641date:2020-08-12T00:00:00
db:NVDid:CVE-2020-8742date:2020-08-13T03:15:16.523