CVE-2020-0559

CVSS V2 Medium 4.6 CVSS V3 High 7.8
Description
Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Overview
  • CVE ID
  • CVE-2020-0559
  • Assigner
  • secure@intel.com
  • Vulnerability Status
  • Analyzed
  • Published Version
  • 2020-08-13T04:15:12
  • Last Modified Date
  • 2022-04-28T18:58:43
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
AND
cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:* 1 OR 21.40.5.1
cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:* 1 OR 21.40.5.1
cpe:2.3:o:intel:ac_7265_firmware:*:*:*:*:*:*:*:* 1 OR 21.40.5.1
cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:* 1 OR 21.40.5.1
cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:* 1 OR 21.40.5.1
cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:* 1 OR 21.40.5.1
cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:* 1 OR 21.40.5.1
cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:* 1 OR 21.40.5.1
cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:* 1 OR 21.40.5.1
cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:* 1 OR 21.40.5.1
cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:* 1 OR 21.40.5.1
cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:* 0 OR
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:* 0 OR
AND
cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:* 1 OR
cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:L/AC:L/Au:N/C:P/I:P/A:P
  • Access Vector
  • LOCAL
  • Access Compatibility
  • LOW
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • PARTIAL
  • Availability Impact
  • PARTIAL
  • Base Score
  • 4.6
  • Severity
  • MEDIUM
  • Exploitability Score
  • 3.9
  • Impact Score
  • 6.4
CVSS Version 3
  • Version
  • 3.1
  • Vector String
  • CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
  • Attack Vector
  • LOCAL
  • Attack Compatibility
  • LOW
  • Privileges Required
  • LOW
  • User Interaction
  • NONE
  • Scope
  • UNCHANGED
  • Confidentiality Impact
  • HIGH
  • Availability Impact
  • HIGH
  • Base Score
  • 7.8
  • Base Severity
  • HIGH
  • Exploitability Score
  • 1.8
  • Impact Score
  • 5.9
History
Created Old Value New Value Data Type Notes
2022-05-10 06:25:34 Added to TrackCVE
2022-12-04 20:59:26 2020-08-13T04:15Z 2020-08-13T04:15:12 CVE Published Date updated
2022-12-04 20:59:26 2022-04-28T18:58:43 CVE Modified Date updated
2022-12-04 20:59:26 Analyzed Vulnerability Status updated