SB2021032618 - Multiple vulnerabilities inIntel I210 network adapter in F5 BIG-IP 



SB2021032618 - Multiple vulnerabilities inIntel I210 network adapter in F5 BIG-IP

Published: March 26, 2021

Security Bulletin ID SB2021032618
Severity
Low
Patch available
NO
Number of vulnerabilities 4
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 4 secuirty vulnerabilities.


1) Improper access control (CVE-ID: CVE-2020-0523)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper access restrictions in the firmware for the Intel(R) Ethernet I210 Controller series of network adapters. A local privileged user can bypass implemented security restrictions and perform a denial of service (DoS) attack.


2) Incorrect default permissions (CVE-ID: CVE-2020-0524)

The vulnerability allows a local user to perform a denial of service attack.

The vulnerability exists due to incorrect default permissions in the firmware for the Intel(R) Ethernet I210 Controller series of network adapters. A local user can perform a denial of service attack.


3) Improper access control (CVE-ID: CVE-2020-0525)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper access restrictions in the firmware for the Intel(R) Ethernet I210 Controller series of network adapters. A local user can bypass implemented security restrictions and perform a denial of service (DoS) attack.


4) Improper Initialization (CVE-ID: CVE-2020-0522)

The vulnerability allows a local user to perform a denial of service (DoS) attack.

The vulnerability exists due to improper initialization in the firmware for the Intel(R) Ethernet I210 Controller series of network adapters. A local user can run a specially crafted application to crash the system.


Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.