Buffer overflow in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow a privileged user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
22 Feb 2021, 20:19
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 6.7 |
CWE | CWE-120 | |
CPE | cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600bpqr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:* cpe:2.3:o:intel:bmc_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600bpsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600bpbr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1000wf:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:* |
|
References | (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html - Patch, Vendor Advisory |
19 Feb 2021, 16:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-02-19 16:15
Updated : 2023-12-10 13:41
NVD link : CVE-2020-12374
Mitre link : CVE-2020-12374
CVE.ORG link : CVE-2020-12374
JSON object : View
Products Affected
intel
- s2600stb
- r2208wfqzs
- r2208wf0zs
- hns2600bpblc24
- s2600wft
- r1304wftys
- hns2600bpb24r
- hns2600bps24r
- hns2600bpbr
- r2224wfqzs
- r2224wftzs
- r1304wf0ysr
- hns2600bps24
- hns2600bpqr
- r2312wftzsr
- r1208wftys
- s2600wf0
- r2208wftzsr
- r2208wfqzsr
- r2224wftzsr
- hns2600bpb
- hns2600bpq
- r2308wftzs
- s2600bpbr
- hns2600bps
- s2600stq
- s2600wfq
- r2308wftzsr
- bmc_firmware
- r1000wf
- r2312wf0npr
- hns2600bpblc24r
- hns2600bpblc
- s2600bpsr
- r2312wfqzs
- hns2600bpsr
- hns2600bpq24r
- r1208wfqysr
- r2208wf0zsr
- hns2600bpb24
- r2312wf0np
- s2600bpqr
- r2312wftzs
- hns2600bpq24
- r2208wftzs
- r1304wftysr
- r1208wftysr
- r1304wf0ys
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')