ID CVE-2020-12312
Type cve
Reporter cve@mitre.org
Modified 2020-11-24T21:06:00
Description
Improper buffer restrictions in the Intel(R) Stratix(R) 10 FPGA firmware provided with the Intel(R) Quartus(R) Prime Pro software before version 20.2 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
{"id": "CVE-2020-12312", "bulletinFamily": "NVD", "title": "CVE-2020-12312", "description": "Improper buffer restrictions in the Intel(R) Stratix(R) 10 FPGA firmware provided with the Intel(R) Quartus(R) Prime Pro software before version 20.2 may allow an unauthenticated user to potentially enable escalation of privilege via physical access.", "published": "2020-11-12T18:15:00", "modified": "2020-11-24T21:06:00", "cvss": {"score": 4.6, "vector": "AV:L/AC:L/Au:N/C:P/I:P/A:P"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-12312", "reporter": "cve@mitre.org", "references": ["https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00388"], "cvelist": ["CVE-2020-12312"], "type": "cve", "lastseen": "2020-12-09T22:03:06", "edition": 4, "viewCount": 0, "enchantments": {"dependencies": {"references": [], "modified": "2020-12-09T22:03:06", "rev": 2}, "score": {"value": 5.8, "vector": "NONE", "modified": "2020-12-09T22:03:06", "rev": 2}, "vulnersScore": 5.8}, "cpe": ["cpe:/o:intel:stratix_10_fpga_firmware:-"], "affectedSoftware": [{"cpeName": "intel:stratix_10_fpga_firmware", "name": "intel stratix 10 fpga firmware", "operator": "eq", "version": "-"}, {"cpeName": "intel:quartus_prime_pro", "name": "intel quartus prime pro", "operator": "lt", "version": "20.2"}], "affectedConfiguration": [{"cpeName": "intel:stratix_10_fpga", "name": "intel stratix 10 fpga", "operator": "eq", "version": "-"}], "cpeConfiguration": {"CVE_data_version": "4.0", "nodes": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:a:intel:quartus_prime_pro:20.2:*:*:*:*:*:*:*", "versionEndExcluding": "20.2", "vulnerable": true}], "operator": "OR"}, {"children": [{"cpe_match": [{"cpe23Uri": "cpe:2.3:o:intel:stratix_10_fpga_firmware:-:*:*:*:*:*:*:*", "vulnerable": true}], "operator": "OR"}, {"cpe_match": [{"cpe23Uri": "cpe:2.3:h:intel:stratix_10_fpga:-:*:*:*:*:*:*:*", "vulnerable": false}], "operator": "OR"}], "operator": "AND"}]}, "cvss2": {"acInsufInfo": false, "cvssV2": {"accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0"}, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false}, "cvss3": {"cvssV3": {"attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "HIGH", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1"}, "exploitabilityScore": 0.9, "impactScore": 5.9}, "cpe23": ["cpe:2.3:o:intel:stratix_10_fpga_firmware:-:*:*:*:*:*:*:*"], "cwe": ["CWE-119"], "scheme": null}
{}