ID

VAR-202106-0896


CVE

CVE-2021-0001


TITLE

Intel(R) IPP  Observable inconsistency vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-008541

DESCRIPTION

Observable timing discrepancy in Intel(R) IPP before version 2020 update 1 may allow authorized user to potentially enable information disclosure via local access. Intel(R) IPP There is an observable mismatch vulnerability in.Information may be obtained. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements. Intel Integrated Performance Primitives (IPP) is a set of programming tools used by Intel Corporation for processing images, signal processing and data. A security vulnerability exists in the Intel Integrated Performance Primitives Cryptographic Library that could lead to information disclosure

Trust: 2.25

sources: NVD: CVE-2021-0001 // JVNDB: JVNDB-2021-008541 // CNNVD: CNNVD-202104-975 // VULHUB: VHN-371570

AFFECTED PRODUCTS

vendor:intelmodel:sgx dcapscope:lteversion:1.10.100.4

Trust: 1.0

vendor:intelmodel:sgx pswscope:lteversion:2.13.100.4

Trust: 1.0

vendor:intelmodel:integrated performance primitives cryptographyscope:eqversion:2019

Trust: 1.0

vendor:intelmodel:sgx sdkscope:lteversion:2.13.100.4

Trust: 1.0

vendor:intelmodel:integrated performance primitives cryptographyscope:eqversion:2020

Trust: 1.0

vendor:intelmodel:sgx sdkscope:lteversion:2.12.100.4

Trust: 1.0

vendor:intelmodel:sgx pswscope:lteversion:2.12.100.4

Trust: 1.0

vendor:インテルmodel:cryptography for intel integrated performance primitivesscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel sgx pswscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel sgx sdkscope: - version: -

Trust: 0.8

vendor:インテルmodel:intel sgx dcap ソフトウェアscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-008541 // NVD: CVE-2021-0001

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-0001
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-0001
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202106-574
value: MEDIUM

Trust: 0.6

VULHUB: VHN-371570
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2021-0001
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-371570
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-0001
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 1.0
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2021-0001
baseSeverity: MEDIUM
baseScore: 4.7
vectorString: CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-371570 // JVNDB: JVNDB-2021-008541 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-574 // NVD: CVE-2021-0001

PROBLEMTYPE DATA

problemtype:CWE-203

Trust: 1.1

problemtype:Observable discrepancy (CWE-203) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-371570 // JVNDB: JVNDB-2021-008541 // NVD: CVE-2021-0001

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202106-574

TYPE

other

Trust: 1.2

sources: CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-574

PATCH

title:INTEL-SA-00477url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00477.html

Trust: 0.8

title:Intel Integrated Performance Primitives Remedial Measures for Security Vulnerabilities in Encryption Libraryurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=155431

Trust: 0.6

title:cve-2021-0001url:https://github.com/goout2/cve-2021-0001

Trust: 0.1

sources: VULMON: CVE-2021-0001 // JVNDB: JVNDB-2021-008541 // CNNVD: CNNVD-202106-574

EXTERNAL IDS

db:NVDid:CVE-2021-0001

Trust: 3.4

db:JVNid:JVNVU99965981

Trust: 0.8

db:JVNDBid:JVNDB-2021-008541

Trust: 0.8

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:AUSCERTid:ESB-2021.2004

Trust: 0.6

db:LENOVOid:LEN-59494

Trust: 0.6

db:CS-HELPid:SB2021061613

Trust: 0.6

db:CNNVDid:CNNVD-202106-574

Trust: 0.6

db:VULHUBid:VHN-371570

Trust: 0.1

db:VULMONid:CVE-2021-0001

Trust: 0.1

sources: VULHUB: VHN-371570 // VULMON: CVE-2021-0001 // JVNDB: JVNDB-2021-008541 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-574 // NVD: CVE-2021-0001

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00477.html

Trust: 1.7

url:https://jvn.jp/vu/jvnvu99965981/

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2021-0001

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://support.lenovo.com/us/en/product_security/len-59494

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2004

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021061613

Trust: 0.6

url:https://github.com/goout2/cve-2021-0001

Trust: 0.1

sources: VULHUB: VHN-371570 // VULMON: CVE-2021-0001 // JVNDB: JVNDB-2021-008541 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202106-574 // NVD: CVE-2021-0001

SOURCES

db:VULHUBid:VHN-371570
db:VULMONid:CVE-2021-0001
db:JVNDBid:JVNDB-2021-008541
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202106-574
db:NVDid:CVE-2021-0001

LAST UPDATE DATE

2024-08-14T12:19:58.777000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-371570date:2021-06-28T00:00:00
db:JVNDBid:JVNDB-2021-008541date:2022-03-18T07:09:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202106-574date:2022-03-10T00:00:00
db:NVDid:CVE-2021-0001date:2021-06-28T18:03:10.733

SOURCES RELEASE DATE

db:VULHUBid:VHN-371570date:2021-06-09T00:00:00
db:JVNDBid:JVNDB-2021-008541date:2022-03-18T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202106-574date:2021-06-08T00:00:00
db:NVDid:CVE-2021-0001date:2021-06-09T20:15:08.180