var-202003-0346
Vulnerability from variot
Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html. Intel(R) NUC Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Intel NUC Kit is a small desktop computer from Intel Corporation.
The firmware in Intel NUC has a privilege escalation vulnerability. The vulnerability stems from the program's failure to properly limit the buffer. A local attacker can use this vulnerability to increase the privilege
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202003-0346", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "nuc kit nuc7i7bnhx1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "bnkbl357.86a.0081" }, { "model": "compute stick stk2m364cc", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ccsklm30.86a.0062" }, { "model": "nuc board d54250wyb", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "wylpt10h.86a.0054" }, { "model": "nuc kit d34010wyk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "wylpt10h.86a.0054" }, { "model": "nuc board nuc7i5dnbe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "dnkbli5v.86a.0067" }, { "model": "nuc 7 home a mini pc nuc7i5bnhxf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "bnkbl357.86a.0081" }, { "model": "nuc 8 mainstream-g mini pc nuc8i7inh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "inwhl357.0036" }, { "model": "nuc kit nuc7i7dnke", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "dnkbli7v.86a.0067" }, { "model": "nuc kit nuc6i5syh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "syskli35.86a.0072" }, { "model": "nuc 8 mainstream-g kit nuc8i7inh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "inwhl357.0036" }, { "model": "nuc kit nuc5i3ryhs", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "rybdwi35.86a.0383" }, { "model": "nuc kit nuc7i3bnh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "bnkbl357.86a.0081" }, { "model": "nuc kit nuc5i5ryhs", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "rybdwi35.86a.0383" }, { "model": "nuc 8 enthusiast pc nuc8i7bekqa", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "becfl357.86a.0077" }, { "model": "nuc 8 business pc nuc8i7hnkqc", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "hnkbli70.86a.0059" }, { "model": "nuc board de3815tybe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "tybyt20h.86a.0024" }, { "model": "nuc kit nuc7i3dnke", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "dnkbli30.86a.0067" }, { "model": "nuc 8 mainstream-g kit nuc8i5inh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "inwhl357.0036" }, { "model": "nuc kit nuc8i7bek", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "becfl357.86a.0077" }, { "model": "nuc kit nuc7pjyh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "jyglkcpx.86a.0053" }, { "model": "nuc kit d54250wyk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "wylpt10h.86a.0054" }, { "model": "nuc kit nuc7i5dnke", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "dnkbli5v.86a.0067" }, { "model": "nuc kit nuc6cays", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ayaplcel.86a.0066" }, { "model": "nuc kit nuc6i3syk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "syskli35.86a.0072" }, { "model": "compute stick stk1a32sc", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "sc0045" }, { "model": "nuc kit nuc5i5ryk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "rybdwi35.86a.0383" }, { "model": "nuc kit nuc5i3myhe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "mybdwi30.86a.0057" }, { "model": "nuc kit nuc7i7dnhe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "dnkbli7v.86a.0067" }, { "model": "nuc 7 home a mini pc nuc7i5bnkp", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "bnkbl357.86a.0081" }, { "model": "nuc kit nuc7i3bnk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "bnkbl357.86a.0081" }, { "model": "nuc board nuc5i3mybe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "mybdwi30.86a.0057" }, { "model": "nuc kit nuc7i7bnh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "bnkbl357.86a.0081" }, { "model": "compute stick stck1a32wfc", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "stck1a32wfc" }, { "model": "nuc kit nuc5cpyh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "pybswcel.86a.0078" }, { "model": "nuc 7 essential pc nuc7cjysal", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "jyglkcpx.86a.0053" }, { "model": "nuc board nuc7i7dnbe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "dnkbli7v.86a.0067" }, { "model": "nuc kit nuc5i3ryhsn", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "rybdwi35.86a.0383" }, { "model": "nuc board nuc5i5mybe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "mybdwi5v.86a.0056" }, { "model": "nuc kit nuc8i7hnk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "hnkbli70.86a.0059" }, { "model": "nuc kit nuc7cjyh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "jyglkcpx.86a.0053" }, { "model": "nuc kit nuc7i5bnhx1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "bnkbl357.86a.0081" }, { "model": "nuc kit nuc5ppyh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "pybswcel.86a.0078" }, { "model": "nuc kit nuc7i5dnhe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "dnkbli5v.86a.0067" }, { "model": "nuc kit nuc6i3syh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "syskli35.86a.0072" }, { "model": "nuc kit nuc7i3bnhx1", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "bnkbl357.86a.0081" }, { "model": "compute stick stk1aw32sc", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "sc0045" }, { "model": "nuc kit d54250wykh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "wylpt10h.86a.0054" }, { "model": "nuc kit nuc7i3dnhe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "dnkbli30.86a.0067" }, { "model": "nuc board nuc8cchb", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "chaplcel.0047" }, { "model": "nuc 8 home pc nuc8i3cysm", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "cycnli35.86a.0044" }, { "model": "nuc kit nuc5i3ryh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "rybdwi35.86a.0383" }, { "model": "nuc kit nuc5i7ryh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "rybdwi35.86a.0383" }, { "model": "nuc kit de3815tykhe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "tybyt20h.86a.0024" }, { "model": "nuc kit nuc6cayh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ayaplcel.86a.0066" }, { "model": "nuc board d34010wyb", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "wylpt10h.86a.0054" }, { "model": "nuc 7 enthusiast pc nuc7i7bnhxg", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "bnkbl357.86a.0081" }, { "model": "nuc kit nuc7i5bnh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "bnkbl357.86a.0081" }, { "model": "compute stick stk2m3w64cc", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "ccsklm30.86a.0062" }, { "model": "nuc kit nuc5i5ryh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "rybdwi35.86a.0383" }, { "model": "compute stick stck1a8lfc", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "stck1a8lfc" }, { "model": "nuc board nuc7i3dnbe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "dnkbli30.86a.0067" }, { "model": "nuc kit d34010wykh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "wylpt10h.86a.0054" }, { "model": "nuc kit nuc7i5bnk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "bnkbl357.86a.0081" }, { "model": "nuc kit nuc6i7kyk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "kyskli70.86a.0066" }, { "model": "nuc 7 home a mini pc nuc7i3bnhxf", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "bnkbl357.86a.0081" }, { "model": "nuc kit nuc5pgyh", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "pybswcel.86a.0078" }, { "model": "nuc kit nuc5i5myhe", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "mybdwi5v.86a.0056" }, { "model": "nuc 8 rugged kit nuc8cchkr", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "chaplcel.0047" }, { "model": "nuc kit nuc6i5syk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "syskli35.86a.0072" }, { "model": "nuc kit nuc5i3ryk", "scope": "eq", "trust": 1.0, "vendor": "intel", "version": "rybdwi35.86a.0383" }, { "model": "nuc kit nuc8i7hnk", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc kit nuc8i7bek", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc 8 mainstream-g kit nuc8i5inh", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc 8 rugged kit nuc8cchkr", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc 8 business pc nuc8i7hnkqc", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc 8 home pc nuc8i3cysm", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc board nuc8cchb", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc 8 enthusiast pc nuc8i7bekqa", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc 8 mainstream-g mini pc nuc8i7inh", "scope": null, "trust": 0.8, "vendor": "intel", "version": null }, { "model": "nuc", "scope": null, "trust": 0.6, "vendor": "intel", "version": null } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-21234" }, { "db": "JVNDB", "id": "JVNDB-2020-002969" }, { "db": "NVD", "id": "CVE-2020-0530" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/o:intel:nuc_8_business_pc_nuc8i7hnkqc_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_8_enthusiast_pc_nuc8i7bekqa_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_8_home_pc_nuc8i3cysm_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_8_mainstream-g_kit_nuc8i5inh_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_8_mainstream-g_kit_nuc8i7inh_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_8_mainstream-g_mini_pc_nuc8i7inh_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_8_rugged_kit_nuc8cchkr_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_board_nuc8cchb_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_nuc8i7bek_firmware", "vulnerable": true }, { "cpe22Uri": "cpe:/o:intel:nuc_kit_nuc8i7hnk_firmware", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002969" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Alexander Ermolov and Dmitry Frolov", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-796" } ], "trust": 0.6 }, "cve": "CVE-2020-0530", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CVE-2020-0530", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 1.0, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Local", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 4.6, "confidentialityImpact": "Partial", "exploitabilityScore": null, "id": "JVNDB-2020-002969", "impactScore": null, "integrityImpact": "Partial", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "exploitabilityScore": 3.9, "id": "CNVD-2020-21234", "impactScore": 6.4, "integrityImpact": "PARTIAL", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "LOCAL", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 1.8, "id": "CVE-2020-0530", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Local", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "JVNDB-2020-002969", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "Low", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2020-0530", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "JVNDB-2020-002969", "trust": 0.8, "value": "High" }, { "author": "CNVD", "id": "CNVD-2020-21234", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-202003-796", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-21234" }, { "db": "JVNDB", "id": "JVNDB-2020-002969" }, { "db": "CNNVD", "id": "CNNVD-202003-796" }, { "db": "NVD", "id": "CVE-2020-0530" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. The list of affected products is provided in intel-sa-00343: https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html. Intel(R) NUC Exists in a classic buffer overflow vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be put into a state. Intel NUC Kit is a small desktop computer from Intel Corporation. \n\r\n\r\nThe firmware in Intel NUC has a privilege escalation vulnerability. The vulnerability stems from the program\u0027s failure to properly limit the buffer. A local attacker can use this vulnerability to increase the privilege", "sources": [ { "db": "NVD", "id": "CVE-2020-0530" }, { "db": "JVNDB", "id": "JVNDB-2020-002969" }, { "db": "CNVD", "id": "CNVD-2020-21234" } ], "trust": 2.16 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2020-0530", "trust": 3.0 }, { "db": "JVN", "id": "JVNVU94445466", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2020-002969", "trust": 0.8 }, { "db": "CNVD", "id": "CNVD-2020-21234", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202003-796", "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-21234" }, { "db": "JVNDB", "id": "JVNDB-2020-002969" }, { "db": "CNNVD", "id": "CNNVD-202003-796" }, { "db": "NVD", "id": "CVE-2020-0530" } ] }, "id": "VAR-202003-0346", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2020-21234" } ], "trust": 1.23617422375 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-21234" } ] }, "last_update_date": "2024-11-23T21:10:18.847000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "INTEL-SA-00343", "trust": 0.8, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" }, { "title": "Patch for Intel NUC Privilege Elevation Vulnerability (CNVD-2020-21234)", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchInfo/show/212389" }, { "title": "Intel NUC Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=111928" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-21234" }, { "db": "JVNDB", "id": "JVNDB-2020-002969" }, { "db": "CNNVD", "id": "CNNVD-202003-796" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-120", "trust": 1.8 } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002969" }, { "db": "NVD", "id": "CVE-2020-0530" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-0530" }, { "trust": 1.6, "url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00343.html" }, { "trust": 0.8, "url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-0530" }, { "trust": 0.8, "url": "http://jvn.jp/vu/jvnvu94445466/index.html" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2020-21234" }, { "db": "JVNDB", "id": "JVNDB-2020-002969" }, { "db": "CNNVD", "id": "CNNVD-202003-796" }, { "db": "NVD", "id": "CVE-2020-0530" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2020-21234" }, { "db": "JVNDB", "id": "JVNDB-2020-002969" }, { "db": "CNNVD", "id": "CNNVD-202003-796" }, { "db": "NVD", "id": "CVE-2020-0530" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-03T00:00:00", "db": "CNVD", "id": "CNVD-2020-21234" }, { "date": "2020-03-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-002969" }, { "date": "2020-03-12T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-796" }, { "date": "2020-03-12T21:15:14.017000", "db": "NVD", "id": "CVE-2020-0530" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2020-04-03T00:00:00", "db": "CNVD", "id": "CNVD-2020-21234" }, { "date": "2020-03-31T00:00:00", "db": "JVNDB", "id": "JVNDB-2020-002969" }, { "date": "2020-04-01T00:00:00", "db": "CNNVD", "id": "CNNVD-202003-796" }, { "date": "2024-11-21T04:53:40.883000", "db": "NVD", "id": "CVE-2020-0530" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "local", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-796" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Intel(R) NUC Classic buffer overflow vulnerability in", "sources": [ { "db": "JVNDB", "id": "JVNDB-2020-002969" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "other", "sources": [ { "db": "CNNVD", "id": "CNNVD-202003-796" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.