Versio.io

CVE-2020-24513

Common vulnerabilities & exposures (CVE)

CVE databaseCVE database blogpostRelease & EoL database
 
Published at: - 09-06-2021 09:15
Last modified: - 22-04-2022 06:20
Total changes: - 6

Description

Domain-bypass transient execution vulnerability in some Intel Atom(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.

Common Vulnerability Scoring System (CVSS)

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N
Low
Attack complexity
Local
Attack vector
None
Availability
High
Confidentiality
None
Integrity
Low
Privileges required
Changed
Scope
None
User interaction
6.5
Base score
2.0
4.0
Exploitability score
Impact score
 

Verification logic

OR
OR
vendor=intel AND product=atom_c3308 AND version=-
vendor=intel AND product=atom_c3336 AND version=-
vendor=intel AND product=atom_c3338 AND version=-
vendor=intel AND product=atom_c3338r AND version=-
vendor=intel AND product=atom_c3436l AND version=-
vendor=intel AND product=atom_c3508 AND version=-
vendor=intel AND product=atom_c3538 AND version=-
vendor=intel AND product=atom_c3558 AND version=-
vendor=intel AND product=atom_c3558r AND version=-
vendor=intel AND product=atom_c3558rc AND version=-
vendor=intel AND product=atom_c3708 AND version=-
vendor=intel AND product=atom_c3750 AND version=-
vendor=intel AND product=atom_c3758 AND version=-
vendor=intel AND product=atom_c3758r AND version=-
vendor=intel AND product=atom_c3808 AND version=-
vendor=intel AND product=atom_c3830 AND version=-
vendor=intel AND product=atom_c3850 AND version=-
vendor=intel AND product=atom_c3858 AND version=-
vendor=intel AND product=atom_c3950 AND version=-
vendor=intel AND product=atom_c3955 AND version=-
vendor=intel AND product=atom_c3958 AND version=-
vendor=intel AND product=atom_p5942b AND version=-
vendor=intel AND product=atom_x5-a3930 AND version=-
vendor=intel AND product=atom_x5-a3940 AND version=-
vendor=intel AND product=atom_x5-a3950 AND version=-
vendor=intel AND product=atom_x5-a3960 AND version=-
vendor=intel AND product=atom_x6200fe AND version=-
vendor=intel AND product=atom_x6211e AND version=-
vendor=intel AND product=atom_x6212re AND version=-
vendor=intel AND product=atom_x6413e AND version=-
vendor=intel AND product=atom_x6425e AND version=-
vendor=intel AND product=atom_x6425re AND version=-
vendor=intel AND product=atom_x6427fe AND version=-
vendor=intel AND product=celeron_j3355 AND version=-
vendor=intel AND product=celeron_j3355e AND version=-
vendor=intel AND product=celeron_j3455 AND version=-
vendor=intel AND product=celeron_j3455e AND version=-
vendor=intel AND product=celeron_j4005 AND version=-
vendor=intel AND product=celeron_j4025 AND version=-
vendor=intel AND product=celeron_j4105 AND version=-
vendor=intel AND product=celeron_j4125 AND version=-
vendor=intel AND product=celeron_j6413 AND version=-
vendor=intel AND product=celeron_n3350 AND version=-
vendor=intel AND product=celeron_n3350e AND version=-
vendor=intel AND product=celeron_n3450 AND version=-
vendor=intel AND product=celeron_n4000 AND version=-
vendor=intel AND product=celeron_n4020 AND version=-
vendor=intel AND product=celeron_n4100 AND version=-
vendor=intel AND product=celeron_n4120 AND version=-
vendor=intel AND product=celeron_n6211 AND version=-
vendor=intel AND product=core_i3-l13g4 AND version=-
vendor=intel AND product=core_i5-l16g7 AND version=-
vendor=intel AND product=p5921b AND version=-
vendor=intel AND product=p5931b AND version=-
vendor=intel AND product=p5962b AND version=-
vendor=intel AND product=pentium_j4205 AND version=-
vendor=intel AND product=pentium_j6425 AND version=-
vendor=intel AND product=pentium_n4200 AND version=-
vendor=intel AND product=pentium_n4200e AND version=-
vendor=intel AND product=pentium_n6415 AND version=-
vendor=intel AND product=pentium_silver_j5005 AND version=-
vendor=intel AND product=pentium_silver_j5040 AND version=-
vendor=intel AND product=pentium_silver_n5000 AND version=-
vendor=intel AND product=pentium_silver_n5030 AND version=-
OR
vendor=Debian AND product=debian_linux AND version=9.0
vendor=Debian AND product=debian_linux AND version=10.0
AND
OR
vendor=siemens AND product=simatic_drive_controller_firmware
OR
vendor=siemens AND product=simatic_drive_controller AND version=-
AND
OR
vendor=siemens AND product=simatic_et_200sp_open_controller_firmware AND versionEndExcluding=0209_0105
OR
vendor=siemens AND product=simatic_et_200sp_open_controller AND version=-
AND
OR
vendor=siemens AND product=simatic_ipc127e_firmware AND versionEndExcluding=21.01.07
OR
vendor=siemens AND product=simatic_ipc127e AND version=-
 

Reference

 


Keywords

NVD

 

CVE-2020-24513

 

CVE

 

Common vulnerabilities & exposures

 

CVSS

 

Common vulnerability scoring system

 

Security

 

Vulnerabilities

 

Exposures

 

We use cookies to ensure that we give you the best experience on our website. Read privacy policies for more information.