Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-12309 (GCVE-0-2020-12309)
Vulnerability from cvelistv5 – Published: 2020-11-12 17:58 – Updated: 2024-08-04 11:56
VLAI?
EPSS
Summary
Insufficiently protected credentialsin subsystem in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access.
Severity ?
No CVSS data available.
CWE
- information disclosure
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Intel(R) Client SSDs and some Intel(R) Data Center SSDs |
Affected:
See references
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T11:56:51.255Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Intel(R) Client SSDs and some Intel(R) Data Center SSDs",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "See references"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Insufficiently protected credentialsin subsystem in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "information disclosure",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-11-12T17:58:25.000Z",
"orgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"shortName": "intel"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-12309",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Client SSDs and some Intel(R) Data Center SSDs",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficiently protected credentialsin subsystem in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "information disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6dda929c-bb53-4a77-a76d-48e79601a1ce",
"assignerShortName": "intel",
"cveId": "CVE-2020-12309",
"datePublished": "2020-11-12T17:58:25.000Z",
"dateReserved": "2020-04-28T00:00:00.000Z",
"dateUpdated": "2024-08-04T11:56:51.255Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
GHSA-GG2H-9FWH-3VGV
Vulnerability from github – Published: 2022-05-24 17:33 – Updated: 2022-05-24 17:33
VLAI?
Details
Insufficiently protected credentialsin subsystem in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access.
{
"affected": [],
"aliases": [
"CVE-2020-12309"
],
"database_specific": {
"cwe_ids": [
"CWE-522"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-11-12T18:15:00Z",
"severity": "MODERATE"
},
"details": "Insufficiently protected credentialsin subsystem in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access.",
"id": "GHSA-gg2h-9fwh-3vgv",
"modified": "2022-05-24T17:33:32Z",
"published": "2022-05-24T17:33:32Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-12309"
},
{
"type": "WEB",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2020-12309
Vulnerability from gsd - Updated: 2023-12-13 01:21Details
Insufficiently protected credentialsin subsystem in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2020-12309",
"description": "Insufficiently protected credentialsin subsystem in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access.",
"id": "GSD-2020-12309"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-12309"
],
"details": "Insufficiently protected credentialsin subsystem in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access.",
"id": "GSD-2020-12309",
"modified": "2023-12-13T01:21:49.202136Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-12309",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Intel(R) Client SSDs and some Intel(R) Data Center SSDs",
"version": {
"version_data": [
{
"version_value": "See references"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Insufficiently protected credentialsin subsystem in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "information disclosure"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362",
"refsource": "MISC",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_pro_6000p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "psf131p",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_pro_6000p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_pro_5450s_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "lhf005p",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_pro_5450s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_e_5100s_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "lhf004e",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_e_5100s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_pro_5400s_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "lbf017p",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_pro_5400s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_pro_7600p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "005p",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_pro_7600p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_760p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "005c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_760p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_e_6100p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "005e",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_e_6100p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_660p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "004c",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_660p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:optane_ssd_905p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "e2010480",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:optane_ssd_905p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:optane_ssd_900p_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "e2010480",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:optane_ssd_900p:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_dc_p4510_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "vdv10170",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_dc_p4510:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_dc_p4610_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "vdv10170",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_dc_p4610:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_dc_p4800x_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "e2010485",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_dc_p4800x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_dc_p4801x_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "e2010485",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_dc_p4801x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_dc_p4101_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "008d",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_dc_p4101:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_pro_5450s_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "lhf0b3p",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_pro_5450s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_e_5100s_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "lhf0ae3",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_e_5100s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
},
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:intel:ssd_pro_5400s_firmware:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "lsf043p",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:intel:ssd_pro_5400s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secure@intel.com",
"ID": "CVE-2020-12309"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Insufficiently protected credentialsin subsystem in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-522"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2020-11-24T19:56Z",
"publishedDate": "2020-11-12T18:15Z"
}
}
}
FKIE_CVE-2020-12309
Vulnerability from fkie_nvd - Published: 2020-11-12 18:15 - Updated: 2024-11-21 04:59
Severity ?
Summary
Insufficiently protected credentialsin subsystem in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_pro_6000p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "877C2ACA-FE26-46AF-9B31-9AEA0F8217EC",
"versionEndExcluding": "psf131p",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_pro_6000p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2467F592-716C-4F14-AD78-A63FD5FCA070",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_pro_5450s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "93987C9E-A704-413E-8C05-5A0EB3FDBDCD",
"versionEndExcluding": "lhf005p",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_pro_5450s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A43071D-B390-4C66-9BA9-5CE1D4E6D241",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_e_5100s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BF591A24-0578-417C-9FBE-066C7643FD26",
"versionEndExcluding": "lhf004e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_e_5100s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6B776D5-41D5-4D69-9DBC-7E3FE30D7991",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_pro_5400s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F4716BCB-0137-4153-B8D0-687EA1B10EE3",
"versionEndExcluding": "lbf017p",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_pro_5400s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "505F3144-6A4B-484F-8BC7-CEFC48850389",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_pro_7600p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4E07B36B-4239-4484-A1CF-E51A97233E65",
"versionEndExcluding": "005p",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_pro_7600p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "551DB608-43C5-4A17-A542-296BB92336B3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_760p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "21A4C067-1BED-41B0-9708-DD69D175A874",
"versionEndExcluding": "005c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_760p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "65B5058C-5EA3-490D-804B-9220DC71A3E6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_e_6100p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0F073D72-843E-45C9-85C7-65279020E344",
"versionEndExcluding": "005e",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_e_6100p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "77AA27B1-5237-4FBF-B5BD-8DB00F0BE87E",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_660p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "53692BC8-46B8-4B0D-BD3B-1FEEADB84510",
"versionEndExcluding": "004c",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_660p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AC382563-BBE1-4982-B6BF-DB2FB9D6C790",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:optane_ssd_905p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "582A6D20-9AE9-4C1C-BCC8-E4C118EF5B7B",
"versionEndExcluding": "e2010480",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:optane_ssd_905p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2BD5595C-0047-441A-B398-8ACA421BB439",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:optane_ssd_900p_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7C09CBDA-E2CB-41F2-8991-EE63641A3456",
"versionEndExcluding": "e2010480",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:optane_ssd_900p:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5AFC9CF7-581F-4B2D-B93C-3D7E3C136F4C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_dc_p4510_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "ED9B7B13-962F-4C4C-9499-A3B7827B0FD0",
"versionEndExcluding": "vdv10170",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_dc_p4510:-:*:*:*:*:*:*:*",
"matchCriteriaId": "318BEFE4-759C-4D96-ADF3-C756B22DBC87",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_dc_p4610_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "24C02DB7-B68E-4DDB-ACF8-DCB1D9641ACE",
"versionEndExcluding": "vdv10170",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_dc_p4610:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AABB3B2D-6688-4260-AE2B-DE10D9C4D48B",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_dc_p4800x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "FA2079DA-BEB7-426C-8AA3-DBAF339A67F9",
"versionEndExcluding": "e2010485",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_dc_p4800x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9CB70E56-CE0F-4935-AB6D-E22C43C1279C",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_dc_p4801x_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "8E424829-6122-4A3F-B2E3-F344F7A3975D",
"versionEndExcluding": "e2010485",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_dc_p4801x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC985659-EC05-4682-A1E9-65B0CFEBD91F",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_dc_p4101_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "2E1FF4F2-88A3-406C-B716-5ED9C857C26C",
"versionEndExcluding": "008d",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_dc_p4101:-:*:*:*:*:*:*:*",
"matchCriteriaId": "03B14F9B-F08F-460D-A144-BC4DA6C9FFB3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_pro_5450s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "C68A3997-8EA3-45F7-BA06-4EBCE6703594",
"versionEndExcluding": "lhf0b3p",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_pro_5450s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "3A43071D-B390-4C66-9BA9-5CE1D4E6D241",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_e_5100s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "0ACB1518-2E3E-4C86-A396-3B9E2D5CA061",
"versionEndExcluding": "lhf0ae3",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_e_5100s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D6B776D5-41D5-4D69-9DBC-7E3FE30D7991",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:intel:ssd_pro_5400s_firmware:*:*:*:*:*:*:*:*",
"matchCriteriaId": "74DFEEA0-E6D7-42F3-9A74-519CF2ACB57D",
"versionEndExcluding": "lsf043p",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:intel:ssd_pro_5400s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "505F3144-6A4B-484F-8BC7-CEFC48850389",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Insufficiently protected credentialsin subsystem in some Intel(R) Client SSDs and some Intel(R) Data Center SSDs may allow an unauthenticated user to potentially enable information disclosure via physical access."
},
{
"lang": "es",
"value": "Unas credenciales protegidas insuficientemente en el subsistema de algunos Intel\u00ae Client SSDs y algunos Intel\u00ae Data Center SSDs pueden habilitar a un usuario no autenticado para permitir potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso f\u00edsico"
}
],
"id": "CVE-2020-12309",
"lastModified": "2024-11-21T04:59:29.443",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "PHYSICAL",
"availabilityImpact": "NONE",
"baseScore": 4.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-11-12T18:15:13.907",
"references": [
{
"source": "secure@intel.com",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362"
}
],
"sourceIdentifier": "secure@intel.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-522"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CERTFR-2020-AVI-734
Vulnerability from certfr_avis - Published: 2020-11-12 - Updated: 2020-11-12
De multiples vulnérabilités ont été découvertes dans les produits Intel. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une élévation de privilèges.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
NoneImpacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Intel | N/A | Intel Server Board S2600ST versions antérieures à 02.01.0011 | ||
| Intel | N/A | Intel QAT pour Linux versions antérieures à 1.7.l.4.10.0 | ||
| Intel | N/A | Intel Unite Cloud Service client versions antérieures à 4.2.12212 | ||
| Intel | N/A | Intel NUC, se référer aux bulletins de l'éditeur pour les versions vulnérables (cf. section Documentation) | ||
| Intel | N/A | les processeurs Intel, se référer aux bulletins de l'éditeur pour les versions vulnérables (cf. section Documentation) | ||
| Intel | N/A | Intel Server Board S2600WF versions antérieures à 02.01.0012 | ||
| Intel | N/A | les disques durs Intel de type SSD, se référer aux bulletins de l'éditeur pour les versions vulnérables (cf. section Documentation) | ||
| Intel | N/A | Intel EMA versions antérieures à 1.3.3 | ||
| Intel | N/A | Intel Data Center Manager Console versions antérieures à 3.6.2 | ||
| Intel | N/A | Intel ADAS IE versions antérieures à ADAS_IE_1.0.766 | ||
| Intel | N/A | les pilotes DCH pour Intel Thunderbolt 3 et 4 sur Windows versions antérieures à 72 | ||
| Intel | N/A | Intel Media SDK pour Windows versions antérieures à 2019 R1 | ||
| Intel | N/A | les interfaces réseau sans fil Intel, se référer aux bulletins de l'éditeur pour les versions vulnérables (cf. section Documentation) | ||
| Intel | N/A | Intel XTU versions antérieures à 6.5.1.360 | ||
| Intel | N/A | Intel Quartus Prime Pro versions antérieures à 20.2 |
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Intel Server Board S2600ST versions ant\u00e9rieures \u00e0 02.01.0011",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel QAT pour Linux versions ant\u00e9rieures \u00e0 1.7.l.4.10.0",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Unite Cloud Service client versions ant\u00e9rieures \u00e0 4.2.12212",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel NUC, se r\u00e9f\u00e9rer aux bulletins de l\u0027\u00e9diteur pour les versions vuln\u00e9rables (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les processeurs Intel, se r\u00e9f\u00e9rer aux bulletins de l\u0027\u00e9diteur pour les versions vuln\u00e9rables (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Server Board S2600WF versions ant\u00e9rieures \u00e0 02.01.0012",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les disques durs Intel de type SSD, se r\u00e9f\u00e9rer aux bulletins de l\u0027\u00e9diteur pour les versions vuln\u00e9rables (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel EMA versions ant\u00e9rieures \u00e0 1.3.3",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Data Center Manager Console versions ant\u00e9rieures \u00e0 3.6.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel ADAS IE versions ant\u00e9rieures \u00e0 ADAS_IE_1.0.766",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les pilotes DCH pour Intel Thunderbolt 3 et 4 sur Windows versions ant\u00e9rieures \u00e0 72",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Media SDK pour Windows versions ant\u00e9rieures \u00e0 2019 R1",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "les interfaces r\u00e9seau sans fil Intel, se r\u00e9f\u00e9rer aux bulletins de l\u0027\u00e9diteur pour les versions vuln\u00e9rables (cf. section Documentation)",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel XTU versions ant\u00e9rieures \u00e0 6.5.1.360",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
},
{
"description": "Intel Quartus Prime Pro versions ant\u00e9rieures \u00e0 20.2",
"product": {
"name": "N/A",
"vendor": {
"name": "Intel",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-8764",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8764"
},
{
"name": "CVE-2020-12350",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12350"
},
{
"name": "CVE-2020-12328",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12328"
},
{
"name": "CVE-2020-12345",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12345"
},
{
"name": "CVE-2020-12317",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12317"
},
{
"name": "CVE-2020-8737",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8737"
},
{
"name": "CVE-2020-12311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12311"
},
{
"name": "CVE-2020-12323",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12323"
},
{
"name": "CVE-2020-24525",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24525"
},
{
"name": "CVE-2020-8739",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8739"
},
{
"name": "CVE-2020-12316",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12316"
},
{
"name": "CVE-2020-0593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0593"
},
{
"name": "CVE-2020-8738",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8738"
},
{
"name": "CVE-2020-12309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12309"
},
{
"name": "CVE-2020-12337",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12337"
},
{
"name": "CVE-2020-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12312"
},
{
"name": "CVE-2020-12324",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12324"
},
{
"name": "CVE-2020-12314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12314"
},
{
"name": "CVE-2020-0591",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0591"
},
{
"name": "CVE-2020-0590",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0590"
},
{
"name": "CVE-2019-11121",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11121"
},
{
"name": "CVE-2020-12326",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12326"
},
{
"name": "CVE-2020-12349",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12349"
},
{
"name": "CVE-2020-12319",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12319"
},
{
"name": "CVE-2020-0592",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0592"
},
{
"name": "CVE-2020-12318",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12318"
},
{
"name": "CVE-2020-0572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0572"
},
{
"name": "CVE-2020-12310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12310"
},
{
"name": "CVE-2020-12331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12331"
},
{
"name": "CVE-2020-12336",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12336"
},
{
"name": "CVE-2020-12347",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12347"
},
{
"name": "CVE-2020-8669",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8669"
},
{
"name": "CVE-2020-0587",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0587"
},
{
"name": "CVE-2020-12333",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12333"
},
{
"name": "CVE-2020-0588",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0588"
},
{
"name": "CVE-2020-0584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0584"
},
{
"name": "CVE-2020-12313",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12313"
},
{
"name": "CVE-2020-8740",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8740"
},
{
"name": "CVE-2020-12325",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12325"
},
{
"name": "CVE-2020-12353",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12353"
},
{
"name": "CVE-2020-12315",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12315"
},
{
"name": "CVE-2020-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12327"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
}
],
"initial_release_date": "2020-11-12T00:00:00",
"last_revision_date": "2020-11-12T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-734",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-11-12T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Intel.\nElles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0\ndistance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une \u00e9l\u00e9vation\nde privil\u00e8ges.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Intel",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00439 du 10 novembre 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00439.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00412 du 10 novembre 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00412.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00430 du 10 novembre 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00430.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00358 du 10 novembre 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00358.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00388 du 10 novembre 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00388.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00262 du 10 novembre 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00262.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00402 du 10 novembre 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00402.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00429 du 10 novembre 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00429.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00418 du 10 novembre 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00418.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00415 du 10 novembre 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00415.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00390 du 10 novembre 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00390.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00420 du 10 novembre 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00420.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00362 du 10 novembre 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00422 du 10 novembre 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00422.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Intel intel-sa-00414 du 10 novembre 2020",
"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00414.html"
}
]
}
CVE-2020-12309
Vulnerability from fstec - Published: 10.11.2020
VLAI Severity ?
Title
Уязвимость микропрограммного обеспечения твердотельных накопителей Intel SSD, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Description
Уязвимость микропрограммного обеспечения твердотельных накопителей Intel SSD связана с отсутствием защиты служебных данных. Эксплуатация уязвимости может позволить нарушителю получить несанкционированный доступ к защищаемой информации
Severity ?
Vendor
Intel Corp.
Software Name
SSD Pro 5450s, SSD E 5100s Series, SSD Pro 5400s Series, SSD Pro 7600p Series, SSD 760p Series, SSD E 6100p Series, SSD 660p Series, Optane SSD 905P Series, Optane SSD 900P Series, SSD DC P4510 Series OPAL U.2 only, SSD DC P4610 Series OPAL, SSD DC P4800X Series, DC P4801X Series, SSD DC P4101 Series
Software Version
до LHF005P/LHF0B3P(2TB) (SSD Pro 5450s), до LHF004E/LHF0AE3(64GB) (SSD E 5100s Series), до LBF017P/LSF043P (SSD Pro 5400s Series), до FW: 005P (SSD Pro 7600p Series), до FW: 005C (SSD 760p Series), до FW: 005E (SSD E 6100p Series), до FW: 004C (SSD 660p Series), до E2010480 (Optane SSD 905P Series), до E2010480 (Optane SSD 900P Series), до VDV10170 (SSD DC P4510 Series OPAL U.2 only), до VDV10170 (SSD DC P4610 Series OPAL), до E2010485 (SSD DC P4800X Series), до E2010485 (DC P4801X Series), до 008D (SSD DC P4101 Series)
Possible Mitigations
Использование рекомендаций:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362.html
Reference
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362.html
https://vuldb.com/?id.164805
CWE
CWE-200
{
"CVSS 2.0": "AV:L/AC:L/Au:N/C:C/I:C/A:N",
"CVSS 3.0": "AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Intel Corp.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e LHF005P/LHF0B3P(2TB) (SSD Pro 5450s), \u0434\u043e LHF004E/LHF0AE3(64GB) (SSD E 5100s Series), \u0434\u043e LBF017P/LSF043P (SSD Pro 5400s Series), \u0434\u043e FW: 005P (SSD Pro 7600p Series), \u0434\u043e FW: 005C (SSD 760p Series), \u0434\u043e FW: 005E (SSD E 6100p Series), \u0434\u043e FW: 004C (SSD 660p Series), \u0434\u043e E2010480 (Optane SSD 905P Series), \u0434\u043e E2010480 (Optane SSD 900P Series), \u0434\u043e VDV10170 (SSD DC P4510 Series OPAL U.2 only), \u0434\u043e VDV10170 (SSD DC P4610 Series OPAL), \u0434\u043e E2010485 (SSD DC P4800X Series), \u0434\u043e E2010485 (DC P4801X Series), \u0434\u043e 008D (SSD DC P4101 Series)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "10.11.2020",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "18.11.2020",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "18.11.2020",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2020-05225",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2020-12309",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "SSD Pro 5450s, SSD E 5100s Series, SSD Pro 5400s Series, SSD Pro 7600p Series, SSD 760p Series, SSD E 6100p Series, SSD 660p Series, Optane SSD 905P Series, Optane SSD 900P Series, SSD DC P4510 Series OPAL U.2 only, SSD DC P4610 Series OPAL, SSD DC P4800X Series, DC P4801X Series, SSD DC P4101 Series",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u0432\u0435\u0440\u0434\u043e\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u0435\u0439 Intel SSD, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u0437\u0430\u0449\u0438\u0442\u044b \u0441\u043b\u0443\u0436\u0435\u0431\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0420\u0430\u0441\u043a\u0440\u044b\u0442\u0438\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 (CWE-200)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f \u0442\u0432\u0435\u0440\u0434\u043e\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u043d\u0430\u043a\u043e\u043f\u0438\u0442\u0435\u043b\u0435\u0439 Intel SSD \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0438\u0435\u043c \u0437\u0430\u0449\u0438\u0442\u044b \u0441\u043b\u0443\u0436\u0435\u0431\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0441\u0431\u043e\u0440 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00362.html\nhttps://vuldb.com/?id.164805",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041c\u0438\u043a\u0440\u043e\u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-200",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,6)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,3)"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…