#VU48427 Permissions, Privileges, and Access Controls in Intel products - CVE-2020-8738
Published: November 16, 2020
Vulnerability identifier: #VU48427
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2020-8738
CWE-ID: CWE-264
Exploitation vector: Local access
Exploit availability:
No public exploit available
Vulnerable software:
2nd Generation Intel Xeon Scalable Processors
Intel Core X-series Processors
Intel Xeon W Processors
Intel Xeon D Processors
Intel Xeon Processor E7 v4 Family
Intel Xeon Processor E5 v3 Family
Intel Xeon Processor E5 v4 Family
Intel Atom Processor C3XXX
Intel Xeon Scalable Processors
2nd Generation Intel Xeon Scalable Processors
Intel Core X-series Processors
Intel Xeon W Processors
Intel Xeon D Processors
Intel Xeon Processor E7 v4 Family
Intel Xeon Processor E5 v3 Family
Intel Xeon Processor E5 v4 Family
Intel Atom Processor C3XXX
Intel Xeon Scalable Processors
Software vendor:
Intel
Intel
Description
The vulnerability allows a local administrator to escalate privileges on the system.
The vulnerability exists due to improper conditions check in Intel BIOS platform sample code, which leads to security restrictions bypass and privilege escalation.
Remediation
Install updates from vendor's website.