Insufficient input validation in the BMC firmware for some Intel(R) Server Boards, Server Systems and Compute Modules before version 2.47 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
22 Feb 2021, 20:48
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 7.8 |
CPE | cpe:2.3:h:intel:hns2600bpq24r:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpb24r:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2208wftzs:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2208wftzsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2312wf0npr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600bpqr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600wfq:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpq:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2308wftzs:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1304wftys:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpblc24:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpqr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2208wfqzs:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2208wfqzsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1208wftys:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2312wfqzs:-:*:*:*:*:*:*:* cpe:2.3:o:intel:bmc_firmware:*:*:*:*:*:*:*:* cpe:2.3:h:intel:r2224wftzs:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2224wftzsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2312wftzs:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600bpsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600wft:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpblc:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1304wf0ysr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600stb:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2312wf0np:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1208wftysr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2224wfqzs:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600bpbr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1304wftysr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpb:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1000wf:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bps:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2312wftzsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2208wf0zsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpbr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpb24:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600wf0:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpblc24r:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1304wf0ys:-:*:*:*:*:*:*:* cpe:2.3:h:intel:s2600stq:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bps24r:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bpq24:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2308wftzsr:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r2208wf0zs:-:*:*:*:*:*:*:* cpe:2.3:h:intel:hns2600bps24:-:*:*:*:*:*:*:* cpe:2.3:h:intel:r1208wfqysr:-:*:*:*:*:*:*:* |
|
References | (MISC) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00434.html - Patch, Vendor Advisory | |
CWE | CWE-20 |
17 Feb 2021, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-02-17 14:15
Updated : 2023-12-10 13:41
NVD link : CVE-2020-12377
Mitre link : CVE-2020-12377
CVE.ORG link : CVE-2020-12377
JSON object : View
Products Affected
intel
- hns2600bpb24r
- hns2600bpblc24
- r1304wf0ysr
- r2208wf0zs
- r2208wfqzsr
- r1208wftys
- hns2600bpq
- r1000wf
- bmc_firmware
- r2312wf0np
- r1208wfqysr
- hns2600bpsr
- hns2600bpbr
- r2312wf0npr
- r2312wftzsr
- s2600bpsr
- s2600wft
- r2308wftzsr
- hns2600bpq24r
- hns2600bpb
- r2224wfqzs
- r2312wfqzs
- s2600bpbr
- hns2600bps
- hns2600bps24
- r2208wftzsr
- r2208wf0zsr
- r1304wftys
- r1304wftysr
- r2208wfqzs
- hns2600bpb24
- r2224wftzs
- s2600wfq
- r1304wf0ys
- s2600stq
- hns2600bpq24
- hns2600bps24r
- hns2600bpqr
- r2208wftzs
- hns2600bpblc
- r2224wftzsr
- s2600stb
- s2600wf0
- s2600bpqr
- r1208wftysr
- hns2600bpblc24r
- r2308wftzs
- r2312wftzs
CWE
CWE-20
Improper Input Validation