ID

VAR-202106-0870


CVE

CVE-2021-0054


TITLE

Pillow Buffer error vulnerability

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

DESCRIPTION

Improper buffer restrictions in system firmware for some Intel(R) NUCs may allow a privileged user to potentially enable escalation of privilege via local access. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Trust: 1.44

sources: NVD: CVE-2021-0054 // CNNVD: CNNVD-202104-975

AFFECTED PRODUCTS

vendor:intelmodel:nuc 10 performance kit nuc10i3fnkscope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 11 enthusiast mini pc nuc11phki7caascope:ltversion:phtgl579.0056

Trust: 1.0

vendor:intelmodel:nuc 10 performance kit nuc10i3fnhfscope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g kit nuc8i7inhscope:ltversion:inwhl357.0040

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi30pscope:ltversion:tntgl357.0052

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi3scope:ltversion:tntgl357.0052

Trust: 1.0

vendor:intelmodel:nuc 10 performance mini pc nuc10i5fnhjascope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 11 performance mini pc nuc11paqi50wascope:ltversion:patgl357.0037

Trust: 1.0

vendor:intelmodel:nuc 10 performance kit nuc10i3fnhscope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7hvkscope:ltversion:hnkbli70.86a.0065

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi5scope:ltversion:tntgl357.0052

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8pcbscope:ltversion:cbwhl.0092

Trust: 1.0

vendor:intelmodel:nuc m15 laptop kit lapbc710scope:ltversion:bctgl357.0051

Trust: 1.0

vendor:intelmodel:nuc 10 performance kit nuc10i5fnkscope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 10 performance mini pc nuc10i7fnkpascope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 10 performance kit nuc10i5fnhscope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc board nuc8cchbscope:ltversion:chaplcel.0051

Trust: 1.0

vendor:intelmodel:nuc 8 pro kit nuc8i3pnhscope:ltversion:pnwhl357.0039

Trust: 1.0

vendor:intelmodel:nuc kit nuc7cjyhscope:ltversion:jyglkcpx.86a.0057

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g kit nuc8i5inhscope:ltversion:inwhl357.0040

Trust: 1.0

vendor:intelmodel:nuc 9 pro kit nuc9vxqnxscope:ltversion:qncflx70.0059

Trust: 1.0

vendor:intelmodel:nuc 10 performance kit nuc10i7fnhcscope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnki5scope:ltversion:tntgl357.0052

Trust: 1.0

vendor:intelmodel:nuc 8 pro board nuc8i3pnbscope:ltversion:pnwhl357.0039

Trust: 1.0

vendor:intelmodel:nuc 10 performance mini pc nuc10i3fnhjascope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g mini pc nuc8i7inhscope:ltversion:inwhl357.0040

Trust: 1.0

vendor:intelmodel:nuc 8 enthusiast\, a mini pc with windows 10 nuc8i7hvkvascope:ltversion:hnkbli70.86a.0065

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8i3cbscope:ltversion:cbwhl.0092

Trust: 1.0

vendor:intelmodel:nuc 10 performance mini pc nuc10i7fnhaascope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 11 pro board nuc11tnbi5scope:ltversion:tntgl357.0052

Trust: 1.0

vendor:intelmodel:nuc 11 performance mini pc nuc11paqi70qascope:ltversion:patgl357.0037

Trust: 1.0

vendor:intelmodel:nuc 11 compute element cm11ebi58wscope:ltversion:ebtgl357.0045

Trust: 1.0

vendor:intelmodel:nuc 7 essential\, a mini pc with windows 10 nuc7cjysalscope:ltversion:jyglkcpx.86a.0057

Trust: 1.0

vendor:intelmodel:nuc 8 pro kit nuc8i3pnkscope:ltversion:pnwhl357.0039

Trust: 1.0

vendor:intelmodel:nuc 10 performance kit nuc10i7fnkscope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc kit nuc7pjyhscope:ltversion:jyglkcpx.86a.0057

Trust: 1.0

vendor:intelmodel:nuc 10 performance kit nuc10i5fnhfscope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc kit nuc8i7hnkscope:ltversion:hnkbli70.86a.0065

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi50lscope:ltversion:tntgl357.0052

Trust: 1.0

vendor:intelmodel:nuc 8 enthusiast\, a mini pc with windows 10 nuc8i7hvkvawscope:ltversion:hnkbli70.86a.0065

Trust: 1.0

vendor:intelmodel:nuc 11 performance kit nuc11pahi3scope:ltversion:patgl357.0037

Trust: 1.0

vendor:intelmodel:nuc 8 mainstream-g mini pc nuc8i5inhscope:ltversion:inwhl357.0040

Trust: 1.0

vendor:intelmodel:nuc 11 performance kit nuc11paki3scope:ltversion:patgl357.0037

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi50wscope:ltversion:tntgl357.0052

Trust: 1.0

vendor:intelmodel:nuc 9 pro kit nuc9v7qnxscope:ltversion:qncflx70.0059

Trust: 1.0

vendor:intelmodel:nuc 11 pro board nuc11tnbi7scope:ltversion:tntgl357.0052

Trust: 1.0

vendor:intelmodel:nuc 10 performance mini pc nuc10i5fnhcascope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi70lscope:ltversion:tntgl357.0052

Trust: 1.0

vendor:intelmodel:nuc 11 compute element cm11ebi716wscope:ltversion:ebtgl357.0045

Trust: 1.0

vendor:intelmodel:nuc 10 performance mini pc nuc10i7fnhjascope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnki3scope:ltversion:tntgl357.0052

Trust: 1.0

vendor:intelmodel:nuc 11 performance kit nuc11paki5scope:ltversion:patgl357.0037

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8i5cbscope:ltversion:cbwhl.0092

Trust: 1.0

vendor:intelmodel:nuc 8 business\, a mini pc with windows 10 nuc8i7hnkqcscope:ltversion:hnkbli70.86a.0065

Trust: 1.0

vendor:intelmodel:nuc 11 performance kit nuc11pahi7scope:ltversion:patgl357.0037

Trust: 1.0

vendor:intelmodel:nuc 11 compute element cm11ebi38wscope:ltversion:ebtgl357.0045

Trust: 1.0

vendor:intelmodel:nuc 11 compute element cm11ebc4scope:ltversion:ebtgl357.0045

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi70qscope:ltversion:tntgl357.0052

Trust: 1.0

vendor:intelmodel:nuc 10 performance kit nuc10i5fnhjscope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 9 pro compute element nuc9v7qnbscope:ltversion:qncflx70.0059

Trust: 1.0

vendor:intelmodel:nuc 8 rugged kit nuc8cchkrscope:ltversion:chaplcel.0051

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8i7cbscope:ltversion:cbwhl.0092

Trust: 1.0

vendor:intelmodel:nuc 11 enthusiast kit nuc11phki7cscope:ltversion:phtgl579.0056

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi30lscope:ltversion:tntgl357.0052

Trust: 1.0

vendor:intelmodel:nuc 10 performance kit nuc10i7fnhscope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 8 compute element cm8ccbscope:ltversion:cbwhl.0092

Trust: 1.0

vendor:intelmodel:nuc 10 performance mini pc nuc10i5fnkpascope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 10 performance mini pc nuc10i3fnhfascope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 10 performance kit nuc10i5fnkpscope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnki7scope:ltversion:tntgl357.0052

Trust: 1.0

vendor:intelmodel:nuc 11 performance kit nuc11pahi5scope:ltversion:patgl357.0037

Trust: 1.0

vendor:intelmodel:nuc m15 laptop kit lapbc510scope:ltversion:bctgl357.0051

Trust: 1.0

vendor:intelmodel:nuc 11 pro kit nuc11tnhi7scope:ltversion:tntgl357.0052

Trust: 1.0

vendor:intelmodel:nuc 11 pro board nuc11tnbi3scope:ltversion:tntgl357.0052

Trust: 1.0

vendor:intelmodel:nuc 10 performance kit nuc10i7fnkpscope:ltversion:fncml.0050

Trust: 1.0

vendor:intelmodel:nuc 9 pro compute element nuc9vxqnbscope:ltversion:qncflx70.0059

Trust: 1.0

vendor:intelmodel:nuc 11 performance kit nuc11paki7scope:ltversion:patgl357.0037

Trust: 1.0

sources: NVD: CVE-2021-0054

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-0054
value: MEDIUM

Trust: 1.0

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202106-711
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2021-0054
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

nvd@nist.gov: CVE-2021-0054
baseSeverity: MEDIUM
baseScore: 6.7
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-711 // NVD: CVE-2021-0054

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.0

sources: NVD: CVE-2021-0054

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202106-711

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

PATCH

title:Intel NUC Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=155756

Trust: 0.6

sources: CNNVD: CNNVD-202106-711

EXTERNAL IDS

db:NVDid:CVE-2021-0054

Trust: 1.6

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:AUSCERTid:ESB-2021.2006

Trust: 0.6

db:CS-HELPid:SB2021061610

Trust: 0.6

db:CNNVDid:CNNVD-202106-711

Trust: 0.6

sources: CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-711 // NVD: CVE-2021-0054

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00511.html

Trust: 1.6

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021061610

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2006

Trust: 0.6

sources: CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-711 // NVD: CVE-2021-0054

SOURCES

db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202106-711
db:NVDid:CVE-2021-0054

LAST UPDATE DATE

2024-08-14T13:18:06.785000+00:00


SOURCES UPDATE DATE

db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202106-711date:2021-07-02T00:00:00
db:NVDid:CVE-2021-0054date:2021-07-01T18:14:16.483

SOURCES RELEASE DATE

db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202106-711date:2021-06-09T00:00:00
db:NVDid:CVE-2021-0054date:2021-06-09T20:15:08.267