CVE-2020-0559

Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:intel:ac_3165_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_3168_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_7265_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_8260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_8265_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_9260_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_9461_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_9462_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ac_9560_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ax200_firmware:*:*:*:*:*:*:*:*
cpe:2.3:o:intel:ax201_firmware:*:*:*:*:*:*:*:*
OR cpe:2.3:o:microsoft:windows_7:-:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows_8.1:-:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*

History

28 Apr 2022, 18:58

Type Values Removed Values Added
References (CONFIRM) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html - (CONFIRM) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html - Vendor Advisory
First Time Intel celeron N2910
Intel celeron N4505
Intel celeron J1900
Intel celeron N3050
Intel celeron N2830
Intel celeron N3350e
Intel pentium N3710
Intel celeron N4000
Intel celeron J6412
Intel celeron N2840
Intel celeron J3355
Intel pentium J6426
Intel celeron J4105
Intel pentium J3710
Intel pentium N6415
Intel pentium J2850
Intel celeron J3060
Intel celeron N2920
Intel celeron N2940
Intel celeron J6413
Intel celeron N2808
Intel pentium N3530
Intel celeron J1850
Intel celeron N2807
Intel celeron N6211
Intel celeron N6210
Intel pentium N3540
Intel celeron J4005
Intel celeron N3010
Intel celeron N3350
Intel atom X5-e3930
Intel celeron J4125
Intel celeron N2930
Intel celeron J3160
Intel celeron N3160
Intel celeron N4100
Intel celeron J3455
Intel pentium N3510
Intel celeron N3150
Intel celeron N3060
Intel pentium N4200
Intel celeron N4120
Intel atom X7-e3950
Intel celeron N3000
Intel celeron N4500
Intel atom X5-e3940
Intel celeron N5100
Intel celeron J4025
Intel celeron N2805
Intel celeron N2806
Intel celeron J1800
Intel celeron N2815
Intel celeron N2810
Intel celeron J3455e
Intel celeron N5105
Intel celeron J3355e
Intel pentium J2900
Intel pentium J4205
Intel celeron J1750
Intel pentium N3700
Intel pentium N4200e
Intel celeron N2820
Intel celeron N4020
Intel celeron N3450
Intel pentium N3520
CWE CWE-276 CWE-732
CPE cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:*
cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:*

Information

Published : 2020-08-13 04:15

Updated : 2023-12-10 13:27


NVD link : CVE-2020-0559

Mitre link : CVE-2020-0559

CVE.ORG link : CVE-2020-0559


JSON object : View

Products Affected

intel

  • pentium_n3530
  • celeron_j3455
  • pentium_j4205
  • celeron_j1900
  • celeron_j1800
  • celeron_n3050
  • celeron_j1750
  • celeron_n4120
  • celeron_n2806
  • celeron_n6211
  • ac_8260_firmware
  • pentium_n3700
  • celeron_n3150
  • celeron_n6210
  • celeron_n3160
  • ac_9260_firmware
  • celeron_j3160
  • atom_x5-e3940
  • pentium_n3710
  • celeron_j6413
  • celeron_n4000
  • celeron_n3350e
  • celeron_n2930
  • pentium_j2850
  • ac_3168_firmware
  • celeron_j3455e
  • ax200_firmware
  • celeron_j6412
  • celeron_n2920
  • ac_9560_firmware
  • celeron_n4020
  • celeron_j1850
  • celeron_n2940
  • celeron_n2830
  • celeron_n4505
  • pentium_n3510
  • pentium_j3710
  • ax201_firmware
  • celeron_j3355e
  • pentium_n4200
  • celeron_n3010
  • celeron_n3060
  • celeron_n2910
  • celeron_n2810
  • celeron_j4105
  • ac_3165_firmware
  • pentium_n4200e
  • pentium_n6415
  • celeron_n3450
  • pentium_j6426
  • pentium_n3540
  • celeron_n4500
  • pentium_j2900
  • ac_7265_firmware
  • celeron_n2805
  • ac_8265_firmware
  • celeron_n3350
  • celeron_n2820
  • celeron_n5100
  • celeron_n2840
  • celeron_n4100
  • celeron_j4005
  • celeron_j4025
  • celeron_j3355
  • pentium_n3520
  • celeron_n5105
  • celeron_n3000
  • ac_9461_firmware
  • ac_9462_firmware
  • atom_x7-e3950
  • atom_x5-e3930
  • celeron_n2815
  • celeron_n2807
  • celeron_n2808
  • celeron_j3060
  • celeron_j4125

microsoft

  • windows_8.1
  • windows_7
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource