Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2020-8679 |
CWE-ID | CWE-787 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
6th Generation Intel Core Processors Hardware solutions / Firmware 7th Generation Intel Core Processors Hardware solutions / Firmware 8th Generation Intel Core Processors Hardware solutions / Firmware 3rd Generation Intel Core Processors Hardware solutions / Firmware 4th generation Intel Core processors Hardware solutions / Firmware 5th generation Intel Core processors Hardware solutions / Firmware 10th Generation Intel Core Processors Hardware solutions / Firmware 9th Generation Intel Core Processors Client/Desktop applications / Web browsers |
Vendor | Intel |
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU45674
Risk: Low
CVSSv3.1:
CVE-ID: CVE-2020-8679
CWE-ID:
CWE-787 - Out-of-bounds write
Exploit availability: No
DescriptionThe vulnerability allows a local user to compromise vulnerable system.
The vulnerability exists due to a boundary error when processing untrusted input in Kernel Mode Driver for some Intel Graphics Drivers. A local user can create a specially crafted file, trick the victim into opening it using the affected software, trigger out-of-bounds write and execute arbitrary code on the target system.
MitigationInstall updates from vendor's website.
Vulnerable software versions6th Generation Intel Core Processors: before 26.20.100.7755
7th Generation Intel Core Processors: before 26.20.100.7755
8th Generation Intel Core Processors: before 26.20.100.7755
3rd Generation Intel Core Processors: before 26.20.100.7755
4th generation Intel Core processors: before 26.20.100.7755
5th generation Intel Core processors: before 26.20.100.7755
9th Generation Intel Core Processors: before 26.20.100.7755
10th Generation Intel Core Processors: before 26.20.100.7755
http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00369.html
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?