Vulnerabilites related to intel - smart_sound_technology
Vulnerability from fkie_nvd
Published
2020-03-12 22:15
Modified
2024-11-21 04:53
Severity ?
Summary
Improper access control in the subsystem for Intel(R) Smart Sound Technology may allow an authenticated user to potentially enable escalation of privilege via local access. This affects Intel® Smart Sound Technology before versions: 10th Generation Intel® Core™ i7 Processors, version 3431 and 8th Generation Intel® Core™ Processors, version 3349.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:smart_sound_technology:3431:*:*:*:*:*:*:*", "matchCriteriaId": "320EE56C-A14C-427D-B3A1-D345BC339444", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i7:1060g7:*:*:*:*:*:*:*", "matchCriteriaId": "863A74E1-7FED-47CE-81DD-74EF3174B906", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:1065g7:*:*:*:*:*:*:*", "matchCriteriaId": "315890AF-DC58-445A-887B-F497BD62392D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:10510u:*:*:*:*:*:*:*", "matchCriteriaId": "EB911A1E-4637-4911-A338-3F0C3B90807E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:10510y:*:*:*:*:*:*:*", "matchCriteriaId": "FB497777-8D0E-41C8-ADF2-18413F695B58", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:10710u:*:*:*:*:*:*:*", "matchCriteriaId": "5E98A49F-A94E-4CC9-BB40-DB9AE61664C6", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:intel:smart_sound_technology:3349:*:*:*:*:*:*:*", "matchCriteriaId": "8F5CB954-F002-41AD-837D-6459B69113B0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:intel:core_i3:8100:*:*:*:*:*:*:*", "matchCriteriaId": "68A76015-0A05-4EC7-B136-DC13B55D881F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8100b:*:*:*:*:*:*:*", "matchCriteriaId": "A4360390-55D1-4A41-9098-37712566C5B1", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8100h:*:*:*:*:*:*:*", "matchCriteriaId": "0DA0AF32-485E-418D-B3F5-F7207CF17E4A", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8100t:*:*:*:*:*:*:*", "matchCriteriaId": "353CB864-53C3-4BC3-B02A-38FEE42BDBCC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8109u:*:*:*:*:*:*:*", "matchCriteriaId": "3A649B47-E110-4C6C-AE60-13DB543CFE29", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8130u:*:*:*:*:*:*:*", "matchCriteriaId": "02377127-6C03-4FED-BB51-555B8E0DB223", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8145u:*:*:*:*:*:*:*", "matchCriteriaId": "07CCBA16-2DC6-43D5-BFF2-550C749DB54E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8145ue:*:*:*:*:*:*:*", "matchCriteriaId": "579C9E23-F17B-4606-8684-2713F62ED6B3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8300:*:*:*:*:*:*:*", "matchCriteriaId": "100127DD-4981-46D3-95A7-D5C0585F097E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8300t:*:*:*:*:*:*:*", "matchCriteriaId": "1228D0D5-8708-4D2A-AEC2-52D6BEFF5AF4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i3:8350k:*:*:*:*:*:*:*", "matchCriteriaId": "C352DCE8-E8D9-40D3-AFE9-B5FB84F7ED33", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8200y:*:*:*:*:*:*:*", "matchCriteriaId": "A529E849-E1FD-4BD1-A6A5-377F79FE26D2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8210y:*:*:*:*:*:*:*", "matchCriteriaId": "97193D6C-50C9-4215-9061-658D16B51FC0", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8250u:*:*:*:*:*:*:*", "matchCriteriaId": "6C4DE25F-168A-4C67-8B66-09F61F072BD4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8257u:*:*:*:*:*:*:*", "matchCriteriaId": "8C276436-2421-44F8-B0C9-B208D3E21D62", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8259u:*:*:*:*:*:*:*", "matchCriteriaId": "11ED2E75-9BCD-4F52-A610-E50A5DA24A8E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8265u:*:*:*:*:*:*:*", "matchCriteriaId": "A216FA06-4E47-4105-8ADE-956F887AFC6B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8269u:*:*:*:*:*:*:*", "matchCriteriaId": "137DECAA-074A-4FEC-A633-FE3836E0D32B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8300h:*:*:*:*:*:*:*", "matchCriteriaId": "80C307EB-64E4-4BBE-A41A-5FE5AF197ACB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8305g:*:*:*:*:*:*:*", "matchCriteriaId": "EDD1091D-CDD9-41C0-A8D8-19B8ECAA672F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8350u:*:*:*:*:*:*:*", "matchCriteriaId": "58157F24-D89E-4552-8CE6-2F01E98BD1E5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8365u:*:*:*:*:*:*:*", "matchCriteriaId": "F3A862B8-6A19-4F35-AC67-DAE6027C39B7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8365ue:*:*:*:*:*:*:*", "matchCriteriaId": "57F70FC6-CFA8-455A-8C5E-B51560079B08", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400:*:*:*:*:*:*:*", "matchCriteriaId": "BC7FFD78-1E1C-4246-BBD3-73FAC06AA46B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400b:*:*:*:*:*:*:*", "matchCriteriaId": "328F854B-3716-47D9-BE70-765DE3689DAC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400h:*:*:*:*:*:*:*", "matchCriteriaId": "D179F530-F642-444C-8184-3770FA8A338E", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8400t:*:*:*:*:*:*:*", "matchCriteriaId": "CB237F89-7405-46F7-972E-81A3B78631BA", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500:*:*:*:*:*:*:*", "matchCriteriaId": "6BA4C4C2-0DC2-46FA-89E9-38F632DACB4C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500b:*:*:*:*:*:*:*", "matchCriteriaId": "017FA232-935C-4096-8087-5F90147589C2", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8500t:*:*:*:*:*:*:*", "matchCriteriaId": "131FA189-EAB5-4D51-AFD8-7AD03D4E0DE7", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600:*:*:*:*:*:*:*", "matchCriteriaId": "7C86118F-42C7-4F7E-B156-AA7AC53BE96B", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600k:*:*:*:*:*:*:*", "matchCriteriaId": "45ACBBEA-EC95-4F3E-B585-893DB6D21A0F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i5:8600t:*:*:*:*:*:*:*", "matchCriteriaId": "E2EFD9AB-6FF2-4C90-AF14-510B16F41C10", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8086k:*:*:*:*:*:*:*", "matchCriteriaId": "B506523F-101E-4F05-82D5-31E37B8B2E8C", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8500y:*:*:*:*:*:*:*", "matchCriteriaId": "1ED47811-5435-43D1-A57F-CA89807A6118", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8550u:*:*:*:*:*:*:*", "matchCriteriaId": "F6FB5695-2950-4CEC-81B4-FD280F835330", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8557u:*:*:*:*:*:*:*", "matchCriteriaId": "6B771584-91DC-49FD-B6EE-0B641704A6C6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8559u:*:*:*:*:*:*:*", "matchCriteriaId": "6799338F-C0F9-4B25-A14C-68C4158B01F6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8565u:*:*:*:*:*:*:*", "matchCriteriaId": "BE77F2FF-75AB-4071-B575-C7ECAF5FAEA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8569u:*:*:*:*:*:*:*", "matchCriteriaId": "B8F65B17-1221-48EB-8F9F-473110089F3D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8650u:*:*:*:*:*:*:*", "matchCriteriaId": "9F340AF8-508F-449D-9AFA-4E55F069B4F3", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8665u:*:*:*:*:*:*:*", "matchCriteriaId": "BCE057B1-5E4B-4D5A-807A-485545416B92", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8665ue:*:*:*:*:*:*:*", "matchCriteriaId": "8A0E7E92-CE45-48F4-B258-3AA177D3D9A8", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700:*:*:*:*:*:*:*", "matchCriteriaId": "E944410E-D674-4141-B50C-9F55090325FF", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700b:*:*:*:*:*:*:*", "matchCriteriaId": "5461E4AD-2944-46A0-A696-FC32CD069D64", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700k:*:*:*:*:*:*:*", "matchCriteriaId": "A6438E07-0AC0-4BF9-B0F2-9072CA9639D6", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8700t:*:*:*:*:*:*:*", "matchCriteriaId": "E2A76E12-842B-4925-B5F5-53497C3E420F", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8705g:*:*:*:*:*:*:*", "matchCriteriaId": "28F8C010-77B1-4774-AE6D-2A8375F5E8B5", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8706g:*:*:*:*:*:*:*", "matchCriteriaId": "19CC5153-BE9A-4394-BFA5-1F0DBEA16163", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8709g:*:*:*:*:*:*:*", "matchCriteriaId": "361C2658-F122-4AE9-B67D-4467F29E096D", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8750h:*:*:*:*:*:*:*", "matchCriteriaId": "66106AD9-F1DA-4A43-9968-7F5BD31D92CD", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8809g:*:*:*:*:*:*:*", "matchCriteriaId": "C47C2864-4B34-46DD-AABF-9F38B72578AC", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i7:8850h:*:*:*:*:*:*:*", "matchCriteriaId": "77AFA400-C880-48AE-B32F-0AC8DF073CCB", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_i9:8950hk:*:*:*:*:*:*:*", "matchCriteriaId": "8F28F2C6-E1CE-4722-A496-C8AEBC7CF6E4", "vulnerable": false }, { "criteria": "cpe:2.3:h:intel:core_m3:8100y:*:*:*:*:*:*:*", "matchCriteriaId": "4224EA3F-39AC-43AB-8A7C-DB645C93D4AA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Improper access control in the subsystem for Intel(R) Smart Sound Technology may allow an authenticated user to potentially enable escalation of privilege via local access. This affects Intel\u00ae Smart Sound Technology before versions: 10th Generation Intel\u00ae Core\u2122 i7 Processors, version 3431 and 8th Generation Intel\u00ae Core\u2122 Processors, version 3349." }, { "lang": "es", "value": "Un control de acceso inapropiado en el subsistema de Intel\u00ae Smart Sound Technology puede permitir a un usuario autenticado habilitar potencialmente una escalada de privilegios por medio de un acceso local. Esto afecta a Intel\u00ae Smart Sound Technology versiones anteriores a: 10th Generation Intel\u00ae Core\u2122 i7 Processors, versi\u00f3n 3431 y 8th Generation Intel\u00ae Core\u2122 Processors, versi\u00f3n 3349." } ], "id": "CVE-2020-0583", "lastModified": "2024-11-21T04:53:47.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 6.0, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-03-12T22:15:15.217", "references": [ { "source": "secure@intel.com", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html" } ], "sourceIdentifier": "secure@intel.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2020-0583
Vulnerability from cvelistv5
Published
2020-03-12 21:08
Modified
2024-08-04 06:02
Severity ?
EPSS score ?
Summary
Improper access control in the subsystem for Intel(R) Smart Sound Technology may allow an authenticated user to potentially enable escalation of privilege via local access. This affects Intel® Smart Sound Technology before versions: 10th Generation Intel® Core™ i7 Processors, version 3431 and 8th Generation Intel® Core™ Processors, version 3349.
References
▼ | URL | Tags |
---|---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Intel | Intel® Smart Sound Technology |
Version: before 10th Generation Intel® Core™ i7 Processors - version 3431 Version: before 8th Generation Intel® Core™ Processors - version 3349 Version: See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:02:52.304Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Intel\u00ae Smart Sound Technology", "vendor": "Intel", "versions": [ { "status": "affected", "version": "before 10th Generation Intel\u00ae Core\u2122 i7 Processors - version 3431" }, { "status": "affected", "version": "before 8th Generation Intel\u00ae Core\u2122 Processors - version 3349" }, { "status": "affected", "version": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html" } ] } ], "descriptions": [ { "lang": "en", "value": "Improper access control in the subsystem for Intel(R) Smart Sound Technology may allow an authenticated user to potentially enable escalation of privilege via local access. This affects Intel\u00ae Smart Sound Technology before versions: 10th Generation Intel\u00ae Core\u2122 i7 Processors, version 3431 and 8th Generation Intel\u00ae Core\u2122 Processors, version 3349." } ], "problemTypes": [ { "descriptions": [ { "description": "Escalation of Privilege", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-03-12T21:08:50", "orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "shortName": "intel" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "secure@intel.com", "ID": "CVE-2020-0583", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Intel\u00ae Smart Sound Technology", "version": { "version_data": [ { "version_value": "before 10th Generation Intel\u00ae Core\u2122 i7 Processors - version 3431" }, { "version_value": "before 8th Generation Intel\u00ae Core\u2122 Processors - version 3349" }, { "version_value": "See advisory https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html" } ] } } ] }, "vendor_name": "Intel" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Improper access control in the subsystem for Intel(R) Smart Sound Technology may allow an authenticated user to potentially enable escalation of privilege via local access. This affects Intel\u00ae Smart Sound Technology before versions: 10th Generation Intel\u00ae Core\u2122 i7 Processors, version 3431 and 8th Generation Intel\u00ae Core\u2122 Processors, version 3349." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Escalation of Privilege" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html", "refsource": "CONFIRM", "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00354.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce", "assignerShortName": "intel", "cveId": "CVE-2020-0583", "datePublished": "2020-03-12T21:08:50", "dateReserved": "2019-10-28T00:00:00", "dateUpdated": "2024-08-04T06:02:52.304Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }