Risk | Low |
Patch available | YES |
Number of vulnerabilities | 17 |
CVE-ID | CVE-2020-0504 CVE-2020-0516 CVE-2020-0514 CVE-2020-0565 CVE-2020-0501 CVE-2020-0505 CVE-2020-0520 CVE-2020-0519 CVE-2020-0515 CVE-2020-0508 CVE-2020-0506 CVE-2020-0517 CVE-2020-0507 CVE-2020-0502 CVE-2020-0567 CVE-2020-0503 CVE-2020-0511 |
CWE-ID | CWE-119 CWE-284 CWE-276 CWE-22 CWE-754 CWE-665 CWE-787 CWE-20 CWE-200 CWE-248 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
3rd Generation Intel Core Processors Hardware solutions / Firmware 4th generation Intel Core processors Hardware solutions / Firmware 5th generation Intel Core processors Hardware solutions / Firmware 6th Generation Intel Core Processors Hardware solutions / Firmware 7th Generation Intel Core Processors Hardware solutions / Firmware 8th Generation Intel Core Processors Hardware solutions / Firmware 10th Generation Intel Core Processors Hardware solutions / Firmware 9th Generation Intel Core Processors Client/Desktop applications / Web browsers |
Vendor | Intel |
Security Bulletin
This security bulletin contains information about 17 vulnerabilities.
EUVDB-ID: #VU26087
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0504
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in several Intel Graphics Drivers. A local user can trigger memory corruption and cause a denial of service condition on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 15.40.44.5107
4th generation Intel Core processors: before 15.40.44.5107
5th generation Intel Core processors: before 15.40.44.5107
6th Generation Intel Core Processors: before 15.40.44.5107
7th Generation Intel Core Processors: before 15.40.44.5107
8th Generation Intel Core Processors: before 15.40.44.5107
9th Generation Intel Core Processors: before 15.40.44.5107
10th Generation Intel Core Processors: before 15.40.44.5107
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26088
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0516
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in several Intel Graphics Drivers. A local user can bypass implemented security restrictions and cause a denial of service (DoS) condition on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 26.20.100.7463
4th generation Intel Core processors: before 26.20.100.7463
5th generation Intel Core processors: before 26.20.100.7463
6th Generation Intel Core Processors: before 26.20.100.7463
7th Generation Intel Core Processors: before 26.20.100.7463
8th Generation Intel Core Processors: before 26.20.100.7463
9th Generation Intel Core Processors: before 26.20.100.7463
10th Generation Intel Core Processors: before 26.20.100.7463
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26099
Risk: Low
CVSSv4.0: 2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0514
CWE-ID:
CWE-276 - Incorrect Default Permissions
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions in the installer for several Intel Graphics Drivers. A local user with access to the system can view contents of files and directories or modify them.
MitigationInstall updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 15.45.30.5103
4th generation Intel Core processors: before 15.45.30.5103
5th generation Intel Core processors: before 15.45.30.5103
6th Generation Intel Core Processors: before 15.45.30.5103
7th Generation Intel Core Processors: before 15.45.30.5103
8th Generation Intel Core Processors: before 15.45.30.5103
9th Generation Intel Core Processors: before 15.45.30.5103
10th Generation Intel Core Processors: before 15.45.30.5103
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26093
Risk: Low
CVSSv4.0: 0.6 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0565
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in several Intel Graphics Drivers. A local user can send a specially crafted HTTP request and read arbitrary files on the system, leading to escalation of privilege.
Install updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 26.20.100.7158
4th generation Intel Core processors: before 26.20.100.7158
5th generation Intel Core processors: before 26.20.100.7158
6th Generation Intel Core Processors: before 26.20.100.7158
7th Generation Intel Core Processors: before 26.20.100.7158
8th Generation Intel Core Processors: before 26.20.100.7158
9th Generation Intel Core Processors: before 26.20.100.7158
10th Generation Intel Core Processors: before 26.20.100.7158
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26092
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0501
CWE-ID:
CWE-119 - Memory corruption
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error in several in Intel Graphics Drivers. A local user can trigger memory corruption and cause a denial of service condition on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 26.20.100.6912
4th generation Intel Core processors: before 26.20.100.6912
5th generation Intel Core processors: before 26.20.100.6912
6th Generation Intel Core Processors: before 26.20.100.6912
7th Generation Intel Core Processors: before 26.20.100.6912
8th Generation Intel Core Processors: before 26.20.100.6912
9th Generation Intel Core Processors: before 26.20.100.6912
10th Generation Intel Core Processors: before 26.20.100.6912
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26091
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0505
CWE-ID:
CWE-754 - Improper Check for Unusual or Exceptional Conditions
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to sensitive information on the target system.
The vulnerability exists due to improper conditions check in several Intel Graphics Drivers. A local user can enable information disclosure and denial of service (DoS).
MitigationInstall updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 15.33.49.5100
4th generation Intel Core processors: before 15.33.49.5100
5th generation Intel Core processors: before 15.33.49.5100
6th Generation Intel Core Processors: before 15.33.49.5100
7th Generation Intel Core Processors: before 15.33.49.5100
8th Generation Intel Core Processors: before 15.33.49.5100
9th Generation Intel Core Processors: before 15.33.49.5100
10th Generation Intel Core Processors: before 15.33.49.5100
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26090
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0520
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in igdkmd64.sys for several Intel Graphics Drivers. A local user can send a specially crafted HTTP request and read arbitrary files on the system, leading to escalation of privilege or denial of service.
MitigationInstall updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 15.33.49.5100
4th generation Intel Core processors: before 15.33.49.5100
5th generation Intel Core processors: before 15.33.49.5100
6th Generation Intel Core Processors: before 15.33.49.5100
7th Generation Intel Core Processors: before 15.33.49.5100
8th Generation Intel Core Processors: before 15.33.49.5100
9th Generation Intel Core Processors: before 15.33.49.5100
10th Generation Intel Core Processors: before 15.33.49.5100
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26089
Risk: Low
CVSSv4.0: 4.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0519
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in several Intel Graphics Drivers. A local user can bypass implemented security restrictions and gain elevated privileges or cause a denial of service (DoS) condition on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 15.33.49.5100
4th generation Intel Core processors: before 15.33.49.5100
5th generation Intel Core processors: before 15.33.49.5100
6th Generation Intel Core Processors: before 15.33.49.5100
7th Generation Intel Core Processors: before 15.33.49.5100
8th Generation Intel Core Processors: before 15.33.49.5100
9th Generation Intel Core Processors: before 15.33.49.5100
10th Generation Intel Core Processors: before 15.33.49.5100
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26100
Risk: Low
CVSSv4.0: 0.6 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0515
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform directory traversal attacks.
The vulnerability exists due to input validation error when processing directory traversal sequences in the installer for several Intel Graphics Drivers. A local user can send a specially crafted HTTP request and read arbitrary files on the system, leading to privilege escalation.
MitigationInstall update from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 15.33.49.5100
4th generation Intel Core processors: before 15.33.49.5100
5th generation Intel Core processors: before 15.33.49.5100
6th Generation Intel Core Processors: before 15.33.49.5100
7th Generation Intel Core Processors: before 15.33.49.5100
8th Generation Intel Core Processors: before 15.33.49.5100
9th Generation Intel Core Processors: before 15.33.49.5100
10th Generation Intel Core Processors: before 15.33.49.5100
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26101
Risk: Low
CVSSv4.0: 2 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0508
CWE-ID:
CWE-276 - Incorrect Default Permissions
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to incorrect default permissions in the installer for several Intel Graphics Drivers. A local user with access to the system can view contents of files and directories or modify them.
MitigationInstall updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 15.33.49.5100
4th generation Intel Core processors: before 15.33.49.5100
5th generation Intel Core processors: before 15.33.49.5100
6th Generation Intel Core Processors: before 15.33.49.5100
7th Generation Intel Core Processors: before 15.33.49.5100
8th Generation Intel Core Processors: before 15.33.49.5100
9th Generation Intel Core Processors: before 15.33.49.5100
10th Generation Intel Core Processors: before 15.33.49.5100
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26115
Risk: Low
CVSSv4.0: 1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0506
CWE-ID:
CWE-665 - Improper Initialization
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization in several Intel Graphics Drivers. A administrator user can run a specially crafted application to cause a denial of service condition on the target system.
Install updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 15.40.44.5107
4th generation Intel Core processors: before 15.40.44.5107
5th generation Intel Core processors: before 15.40.44.5107
6th Generation Intel Core Processors: before 15.40.44.5107
7th Generation Intel Core Processors: before 15.40.44.5107
8th Generation Intel Core Processors: before 15.40.44.5107
9th Generation Intel Core Processors: before 15.40.44.5107
10th Generation Intel Core Processors: before 15.40.44.5107
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26114
Risk: Low
CVSSv4.0: 4.4 [CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0517
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input several in Intel Graphics Drivers. A local user can trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 15.36.38.5117
4th generation Intel Core processors: before 15.36.38.5117
5th generation Intel Core processors: before 15.36.38.5117
6th Generation Intel Core Processors: before 15.36.38.5117
7th Generation Intel Core Processors: before 15.36.38.5117
8th Generation Intel Core Processors: before 15.36.38.5117
9th Generation Intel Core Processors: before 15.36.38.5117
10th Generation Intel Core Processors: before 15.36.38.5117
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26113
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0507
CWE-ID:
CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform directory traversal attacks.
The vulnerability exists due to unquoted service path in several Intel Graphics Drivers. A local administrator can send a specially crafted HTTP request, read arbitrary files on the system and perform a denial of service (DoS) attack.
MitigationInstall update from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 15.33.49.5100
4th generation Intel Core processors: before 15.33.49.5100
5th generation Intel Core processors: before 15.33.49.5100
6th Generation Intel Core Processors: before 15.33.49.5100
7th Generation Intel Core Processors: before 15.33.49.5100
8th Generation Intel Core Processors: before 15.33.49.5100
9th Generation Intel Core Processors: before 15.33.49.5100
10th Generation Intel Core Processors: before 15.33.49.5100
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26112
Risk: Low
CVSSv4.0: 1.1 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0502
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in several Intel Graphics Drivers. A local user can bypass implemented security restrictions and gain elevated privileges on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 26.20.100.6912
4th generation Intel Core processors: before 26.20.100.6912
5th generation Intel Core processors: before 26.20.100.6912
6th Generation Intel Core Processors: before 26.20.100.6912
7th Generation Intel Core Processors: before 26.20.100.6912
8th Generation Intel Core Processors: before 26.20.100.6912
9th Generation Intel Core Processors: before 26.20.100.6912
10th Generation Intel Core Processors: before 26.20.100.6912
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26111
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0567
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in several Intel Graphics Drivers. A local user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
MitigationInstall updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 26.20.100.7212
4th generation Intel Core processors: before 26.20.100.7212
5th generation Intel Core processors: before 26.20.100.7212
6th Generation Intel Core Processors: before 26.20.100.7212
7th Generation Intel Core Processors: before 26.20.100.7212
8th Generation Intel Core Processors: before 26.20.100.7212
9th Generation Intel Core Processors: before 26.20.100.7212
10th Generation Intel Core Processors: before 26.20.100.7212
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26110
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0503
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to improper access control in several Intel Graphics Drivers. A local user can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 26.20.100.7212
4th generation Intel Core processors: before 26.20.100.7212
5th generation Intel Core processors: before 26.20.100.7212
6th Generation Intel Core Processors: before 26.20.100.7212
7th Generation Intel Core Processors: before 26.20.100.7212
8th Generation Intel Core Processors: before 26.20.100.7212
9th Generation Intel Core Processors: before 26.20.100.7212
10th Generation Intel Core Processors: before 26.20.100.7212
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU26109
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0511
CWE-ID:
CWE-248 - Uncaught Exception
Exploit availability: No
DescriptionThe vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to uncaught exception in system driver for several Intel Graphics Drivers. A local user can cause a denial of service condition on the target system.
Install updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 15.40.44.5107
4th generation Intel Core processors: before 15.40.44.5107
5th generation Intel Core processors: before 15.40.44.5107
6th Generation Intel Core Processors: before 15.40.44.5107
7th Generation Intel Core Processors: before 15.40.44.5107
8th Generation Intel Core Processors: before 15.40.44.5107
9th Generation Intel Core Processors: before 15.40.44.5107
10th Generation Intel Core Processors: before 15.40.44.5107
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00315.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.