ID

VAR-202011-0182


CVE

CVE-2020-12337


TITLE

plural  Intel(R) NUC  Buffer error vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2020-013303

DESCRIPTION

Improper buffer restrictions in firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. plural Intel(R) NUC A buffer error vulnerability exists in the firmware.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Intel NUC Kit is a small desktop computer manufactured by Intel Corporation. No detailed vulnerability details are currently provided

Trust: 2.16

sources: NVD: CVE-2020-12337 // JVNDB: JVNDB-2020-013303 // CNVD: CNVD-2020-66301

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-66301

AFFECTED PRODUCTS

vendor:intelmodel:nuc board h27002-401scope:eqversion:tybyt10h.86a

Trust: 1.0

vendor:intelmodel:nuc board h27002-400scope:eqversion:tybyt10h.86a

Trust: 1.0

vendor:intelmodel:nuc 8 rugged kit nuc8cchkrscope:eqversion:chaplcel.0049

Trust: 1.0

vendor:intelmodel:nuc 8 pro kit nuc8i3pnkscope:eqversion:pnwhl357.0037

Trust: 1.0

vendor:intelmodel:nuc kit h26998-403scope:eqversion:tybyt10h.86a

Trust: 1.0

vendor:intelmodel:nuc kit h26998-405scope:eqversion:tybyt10h.86a

Trust: 1.0

vendor:intelmodel:nuc kit h26998-500scope:eqversion:tybyt20h.86a

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g mini pc nuc8i7inhscope:eqversion:inwhl357.0036

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g kit nuc8i7inhscope:eqversion:inwhl357.0036

Trust: 1.0

vendor:intelmodel:nuc 9 pro kit nuc9v7qnxscope:eqversion:qncflx70.34

Trust: 1.0

vendor:intelmodel:nuc board h27002-402scope:eqversion:tybyt10h.86a

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g kit nuc8i5inhscope:eqversion:inwhl357.0036

Trust: 1.0

vendor:intelmodel:nuc 8 pro mini pc nuc8i3pnkscope:eqversion:pnwhl357.0037

Trust: 1.0

vendor:intelmodel:nuc board nuc8cchbscope:eqversion:chaplcel.0049

Trust: 1.0

vendor:intelmodel:nuc 8 pro kit nuc8i3pnhscope:eqversion:pnwhl357.0037

Trust: 1.0

vendor:intelmodel:nuc board h27002-500scope:eqversion:tybyt20h.86a

Trust: 1.0

vendor:intelmodel:nuc board h27002-404scope:eqversion:tybyt10h.86a

Trust: 1.0

vendor:intelmodel:nuc kit h26998-401scope:eqversion:tybyt10h.86a

Trust: 1.0

vendor:intelmodel:nuc kit h26998-404scope:eqversion:tybyt10h.86a

Trust: 1.0

vendor:intelmodel:nuc kit h26998-402scope:eqversion:tybyt10h.86a

Trust: 1.0

vendor:intelmodel:nuc 9 pro kit nuc9vxqnxscope:eqversion:qncflx70.34

Trust: 1.0

vendor:intelmodel:nuc 8 pro board nuc8i3pnbscope:eqversion:pnwhl357.0037

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g mini pc nuc8i5inhscope:eqversion:inwhl357.0036

Trust: 1.0

vendor:インテルmodel:intel nuc 8 pro board nuc8i3pnpscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 8 rugged kit nuc8cchkrscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 8 mainstream-g kit nuc8i5inhscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 8 mainstream-g mini pc nuc8i5inhscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 8 pro kit nuc8i3pnhscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc board h27002-404scope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 8 mainstream-g kit pc nuc8i7inhscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 8 pro kit nuc8i3pnkscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc 8 mainstream-g mini pc nuc8i7inhscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel nuc board h27002-500scope: - version: -

Trust: 0.8

vendor:intelmodel:nuc kitscope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2020-66301 // JVNDB: JVNDB-2020-013303 // NVD: CVE-2020-12337

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-12337
value: MEDIUM

Trust: 1.0

NVD: CVE-2020-12337
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2020-66301
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202011-930
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2020-12337
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2020-66301
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-12337
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2020-12337
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-66301 // JVNDB: JVNDB-2020-013303 // CNNVD: CNNVD-202011-930 // NVD: CVE-2020-12337

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:Buffer error (CWE-119) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-013303 // NVD: CVE-2020-12337

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202011-930

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202011-930

PATCH

title:INTEL-SA-00414url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414.html

Trust: 0.8

title:Patch for Intel NUC Kit buffer overflow vulnerability (CNVD-2020-66301)url:https://www.cnvd.org.cn/patchInfo/show/241126

Trust: 0.6

sources: CNVD: CNVD-2020-66301 // JVNDB: JVNDB-2020-013303

EXTERNAL IDS

db:NVDid:CVE-2020-12337

Trust: 3.0

db:JVNDBid:JVNDB-2020-013303

Trust: 0.8

db:CNVDid:CNVD-2020-66301

Trust: 0.6

db:AUSCERTid:ESB-2020.3987

Trust: 0.6

db:CNNVDid:CNNVD-202011-930

Trust: 0.6

sources: CNVD: CNVD-2020-66301 // JVNDB: JVNDB-2020-013303 // CNNVD: CNNVD-202011-930 // NVD: CVE-2020-12337

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414

Trust: 2.2

url:https://nvd.nist.gov/vuln/detail/cve-2020-12337

Trust: 1.4

url:https://www.auscert.org.au/bulletins/esb-2020.3987/

Trust: 0.6

sources: CNVD: CNVD-2020-66301 // JVNDB: JVNDB-2020-013303 // CNNVD: CNNVD-202011-930 // NVD: CVE-2020-12337

SOURCES

db:CNVDid:CNVD-2020-66301
db:JVNDBid:JVNDB-2020-013303
db:CNNVDid:CNNVD-202011-930
db:NVDid:CVE-2020-12337

LAST UPDATE DATE

2024-11-23T21:35:08.895000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-66301date:2020-11-25T00:00:00
db:JVNDBid:JVNDB-2020-013303date:2021-06-23T08:06:00
db:CNNVDid:CNNVD-202011-930date:2020-11-24T00:00:00
db:NVDid:CVE-2020-12337date:2024-11-21T04:59:32.477

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-66301date:2020-11-25T00:00:00
db:JVNDBid:JVNDB-2020-013303date:2021-06-23T00:00:00
db:CNNVDid:CNNVD-202011-930date:2020-11-11T00:00:00
db:NVDid:CVE-2020-12337date:2020-11-12T19:15:14.067