Risk | Low |
Patch available | YES |
Number of vulnerabilities | 2 |
CVE-ID | CVE-2020-0510 CVE-2020-8680 |
CWE-ID | CWE-125 CWE-362 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software |
3rd Generation Intel Core Processors Hardware solutions / Firmware 4th generation Intel Core processors Hardware solutions / Firmware 5th generation Intel Core processors Hardware solutions / Firmware 6th Generation Intel Core Processors Hardware solutions / Firmware 7th Generation Intel Core Processors Hardware solutions / Firmware 8th Generation Intel Core Processors Hardware solutions / Firmware 10th Generation Intel Core Processors Hardware solutions / Firmware 9th Generation Intel Core Processors Client/Desktop applications / Web browsers |
Vendor | Intel |
Security Bulletin
This security bulletin contains information about 2 vulnerabilities.
Updated 13.08.2020
Added vulnerability #2
EUVDB-ID: #VU45645
Risk: Low
CVSSv4.0: 4.3 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-0510
CWE-ID:
CWE-125 - Out-of-bounds read
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in some Intel Graphics Drivers. A local user can trigger out-of-bounds read error and read contents of memory on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 15.40.45.5126
4th generation Intel Core processors: before 15.40.45.5126
5th generation Intel Core processors: before 15.40.45.5126
6th Generation Intel Core Processors: before 15.40.45.5126
7th Generation Intel Core Processors: before 15.40.45.5126
8th Generation Intel Core Processors: before 15.40.45.5126
9th Generation Intel Core Processors: before 15.40.45.5126
10th Generation Intel Core Processors: before 15.40.45.5126
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU45670
Risk: Low
CVSSv4.0: 4.5 [CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2020-8680
Exploit availability: No
DescriptionThe vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in some Intel Graphics Drivers. A local user can exploit the race and escalate privileges on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versions3rd Generation Intel Core Processors: before 15.40.45.5126
4th generation Intel Core processors: before 15.40.45.5126
5th generation Intel Core processors: before 15.40.45.5126
6th Generation Intel Core Processors: before 15.40.45.5126
7th Generation Intel Core Processors: before 15.40.45.5126
8th Generation Intel Core Processors: before 15.40.45.5126
9th Generation Intel Core Processors: before 15.40.45.5126
10th Generation Intel Core Processors: before 15.40.45.5126
CPE2.3https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.