A potential security vulnerability in Intel® Programmable Acceleration Cards (PAC) with Arria® 10 GX Field Programmable Gate Arrays (FPGA) may allow escalation of privilege.** **Intel is releasing firmware updates to mitigate this potential vulnerability.
CVEID: CVE-2020-8684
Description: Improper access control in firmware for Intel® PAC with Arria® 10 GX FPGA before Intel Acceleration Stack version 1.2.1 may allow a privileged user to potentially enable escalation of privilege via local access.
CVSS Base Score: 7.2 High
CVSS Vector: CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:H
Intel® PAC with Arria® 10 GX FPGA before Intel Acceleration Stack version 1.2.1.
Intel recommends updating Intel® PAC with Arria® 10 GX FPGA to Intel Acceleration Stack version 1.2.1 or later.
Updates are available for download at this location: <https://www.intel.com/content/www/us/en/programmable/products/boards_and_kits/dev-kits/altera/acceleration-card-arria-10-gx/getting-started.html>
This issue was found internally by Brent Thomas and Jaime Zepeda.
Intel, and nearly the entire technology industry, follows a disclosure practice called Coordinated Disclosure, under which a cybersecurity vulnerability is generally publicly disclosed only after mitigations are available.