ID

VAR-202011-0137


CVE

CVE-2020-12349


TITLE

Intel(R) Data Center Manager Console  Input confirmation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2020-013306

DESCRIPTION

Improper input validation in the Intel(R) Data Center Manager Console before version 3.6.2 may allow an authenticated user to potentially enable information disclosure via network access. This product mainly provides real-time power supply and heat dissipation data of equipment

Trust: 1.71

sources: NVD: CVE-2020-12349 // JVNDB: JVNDB-2020-013306 // VULHUB: VHN-165018

AFFECTED PRODUCTS

vendor:intelmodel:data center managerscope:ltversion:3.6.2

Trust: 1.0

vendor:インテルmodel:intel data center managerscope:eqversion:3.6.2

Trust: 0.8

vendor:インテルmodel:intel data center managerscope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-013306 // NVD: CVE-2020-12349

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-12349
value: MEDIUM

Trust: 1.0

NVD: CVE-2020-12349
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202011-855
value: MEDIUM

Trust: 0.6

VULHUB: VHN-165018
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-12349
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-165018
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:L/AU:S/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: SINGLE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 8.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-12349
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2020-12349
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-165018 // JVNDB: JVNDB-2020-013306 // CNNVD: CNNVD-202011-855 // NVD: CVE-2020-12349

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.1

problemtype:Incorrect input confirmation (CWE-20) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-165018 // JVNDB: JVNDB-2020-013306 // NVD: CVE-2020-12349

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202011-855

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-202011-855

PATCH

title:INTEL-SA-00430url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00430.html

Trust: 0.8

title:Intel Data Center Manager Console Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=134970

Trust: 0.6

sources: JVNDB: JVNDB-2020-013306 // CNNVD: CNNVD-202011-855

EXTERNAL IDS

db:NVDid:CVE-2020-12349

Trust: 2.5

db:JVNDBid:JVNDB-2020-013306

Trust: 0.8

db:CNNVDid:CNNVD-202011-855

Trust: 0.7

db:AUSCERTid:ESB-2020.3953

Trust: 0.6

db:VULHUBid:VHN-165018

Trust: 0.1

sources: VULHUB: VHN-165018 // JVNDB: JVNDB-2020-013306 // CNNVD: CNNVD-202011-855 // NVD: CVE-2020-12349

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00430

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-12349

Trust: 1.4

url:https://www.auscert.org.au/bulletins/esb-2020.3953/

Trust: 0.6

sources: VULHUB: VHN-165018 // JVNDB: JVNDB-2020-013306 // CNNVD: CNNVD-202011-855 // NVD: CVE-2020-12349

SOURCES

db:VULHUBid:VHN-165018
db:JVNDBid:JVNDB-2020-013306
db:CNNVDid:CNNVD-202011-855
db:NVDid:CVE-2020-12349

LAST UPDATE DATE

2024-11-23T21:51:14.090000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-165018date:2020-11-20T00:00:00
db:JVNDBid:JVNDB-2020-013306date:2021-06-23T08:06:00
db:CNNVDid:CNNVD-202011-855date:2020-11-24T00:00:00
db:NVDid:CVE-2020-12349date:2024-11-21T04:59:33.190

SOURCES RELEASE DATE

db:VULHUBid:VHN-165018date:2020-11-12T00:00:00
db:JVNDBid:JVNDB-2020-013306date:2021-06-23T00:00:00
db:CNNVDid:CNNVD-202011-855date:2020-11-11T00:00:00
db:NVDid:CVE-2020-12349date:2020-11-12T19:15:14.347