#VU48426 Improper access control in Intel products - CVE-2020-8764
Published: November 12, 2020 / Updated: November 16, 2020
Vulnerability identifier: #VU48426
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2020-8764
CWE-ID: CWE-284
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
2nd Generation Intel Xeon Scalable Processors
Intel Core X-series Processors
Intel Xeon W Processors
Intel Xeon D Processors
Intel Xeon Processor E7 v4 Family
Intel Xeon Processor E5 v3 Family
Intel Xeon Processor E5 v4 Family
Intel Xeon Scalable Processors
2nd Generation Intel Xeon Scalable Processors
Intel Core X-series Processors
Intel Xeon W Processors
Intel Xeon D Processors
Intel Xeon Processor E7 v4 Family
Intel Xeon Processor E5 v3 Family
Intel Xeon Processor E5 v4 Family
Intel Xeon Scalable Processors
Software vendor:
Intel
Intel
Description
The vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions in BIOS firmware. A local administrator can bypass implemented security restrictions, gain unauthorized access to the application and escalate privileges on the target system.
Remediation
Install updates from vendor's website.