Versio.io

CVE-2020-0559

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 13-08-2020 06:15
Last modified: - 28-04-2022 08:58
Total changes: - 3

Description

Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Low
Attack complexity
Local
Attack vector
High
Availability
High
Confidentiality
High
Integrity
Low
Privileges required
Unchanged
Scope
None
User interaction
7.8
Base score
1.8
5.9
Exploitability score
Impact score
 

Verification logic

OR
AND
OR
vendor=intel AND product=ac_3165_firmware AND versionEndExcluding=21.40.5.1
vendor=intel AND product=ac_3168_firmware AND versionEndExcluding=21.40.5.1
vendor=intel AND product=ac_7265_firmware AND versionEndExcluding=21.40.5.1
vendor=intel AND product=ac_8260_firmware AND versionEndExcluding=21.40.5.1
vendor=intel AND product=ac_8265_firmware AND versionEndExcluding=21.40.5.1
vendor=intel AND product=ac_9260_firmware AND versionEndExcluding=21.40.5.1
vendor=intel AND product=ac_9461_firmware AND versionEndExcluding=21.40.5.1
vendor=intel AND product=ac_9462_firmware AND versionEndExcluding=21.40.5.1
vendor=intel AND product=ac_9560_firmware AND versionEndExcluding=21.40.5.1
vendor=intel AND product=ax200_firmware AND versionEndExcluding=21.40.5.1
vendor=intel AND product=ax201_firmware AND versionEndExcluding=21.40.5.1
OR
vendor=microsoft AND product=windows_7 AND version=-
vendor=microsoft AND product=windows_8.1 AND version=-
OR
vendor=intel AND product=atom_x5-e3930 AND version=-
vendor=intel AND product=atom_x5-e3940 AND version=-
vendor=intel AND product=atom_x7-e3950 AND version=-
vendor=intel AND product=celeron_j1750 AND version=-
vendor=intel AND product=celeron_j1800 AND version=-
vendor=intel AND product=celeron_j1850 AND version=-
vendor=intel AND product=celeron_j1900 AND version=-
vendor=intel AND product=celeron_j3060 AND version=-
vendor=intel AND product=celeron_j3160 AND version=-
vendor=intel AND product=celeron_j3355 AND version=-
vendor=intel AND product=celeron_j3355e AND version=-
vendor=intel AND product=celeron_j3455 AND version=-
vendor=intel AND product=celeron_j3455e AND version=-
vendor=intel AND product=celeron_j4005 AND version=-
vendor=intel AND product=celeron_j4025 AND version=-
vendor=intel AND product=celeron_j4105 AND version=-
vendor=intel AND product=celeron_j4125 AND version=-
vendor=intel AND product=celeron_j6412 AND version=-
vendor=intel AND product=celeron_j6413 AND version=-
vendor=intel AND product=celeron_n2805 AND version=-
vendor=intel AND product=celeron_n2806 AND version=-
vendor=intel AND product=celeron_n2807 AND version=-
vendor=intel AND product=celeron_n2808 AND version=-
vendor=intel AND product=celeron_n2810 AND version=-
vendor=intel AND product=celeron_n2815 AND version=-
vendor=intel AND product=celeron_n2820 AND version=-
vendor=intel AND product=celeron_n2830 AND version=-
vendor=intel AND product=celeron_n2840 AND version=-
vendor=intel AND product=celeron_n2910 AND version=-
vendor=intel AND product=celeron_n2920 AND version=-
vendor=intel AND product=celeron_n2930 AND version=-
vendor=intel AND product=celeron_n2940 AND version=-
vendor=intel AND product=celeron_n3000 AND version=-
vendor=intel AND product=celeron_n3010 AND version=-
vendor=intel AND product=celeron_n3050 AND version=-
vendor=intel AND product=celeron_n3060 AND version=-
vendor=intel AND product=celeron_n3150 AND version=-
vendor=intel AND product=celeron_n3160 AND version=-
vendor=intel AND product=celeron_n3350 AND version=-
vendor=intel AND product=celeron_n3350e AND version=-
vendor=intel AND product=celeron_n3450 AND version=-
vendor=intel AND product=celeron_n4000 AND version=-
vendor=intel AND product=celeron_n4020 AND version=-
vendor=intel AND product=celeron_n4100 AND version=-
vendor=intel AND product=celeron_n4120 AND version=-
vendor=intel AND product=celeron_n4500 AND version=-
vendor=intel AND product=celeron_n4505 AND version=-
vendor=intel AND product=celeron_n5100 AND version=-
vendor=intel AND product=celeron_n5105 AND version=-
vendor=intel AND product=celeron_n6210 AND version=-
vendor=intel AND product=celeron_n6211 AND version=-
vendor=intel AND product=pentium_j2850 AND version=-
vendor=intel AND product=pentium_j2900 AND version=-
vendor=intel AND product=pentium_j3710 AND version=-
vendor=intel AND product=pentium_j4205 AND version=-
vendor=intel AND product=pentium_j6426 AND version=-
vendor=intel AND product=pentium_n3510 AND version=-
vendor=intel AND product=pentium_n3520 AND version=-
vendor=intel AND product=pentium_n3530 AND version=-
vendor=intel AND product=pentium_n3540 AND version=-
vendor=intel AND product=pentium_n3700 AND version=-
vendor=intel AND product=pentium_n3710 AND version=-
vendor=intel AND product=pentium_n4200 AND version=-
vendor=intel AND product=pentium_n4200e AND version=-
vendor=intel AND product=pentium_n6415 AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2020-0559

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.