SB2021061616 - Multiple vulnerabilities in Intel Processors
Published: June 16, 2021
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 8 secuirty vulnerabilities.
1) Improper Initialization (CVE-ID: CVE-2020-12357)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to improper initialization in the firmware. A local administrator can run a specially crafted application to execute arbitrary code with escalated privileges on the system.
2) Race condition (CVE-ID: CVE-2020-8670)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to a race condition in the firmware . A local administrator can exploit the race and gain unauthorized access to sensitive information and escalate privileges on the system.
3) Input validation error (CVE-ID: CVE-2020-8700)
The vulnerability allows a local user to escalate privileges on the system.
The vulnerability exists due to insufficient validation of user-supplied input in the firmware. A local administrator can pass specially crafted input to the application and gain elevated privileges on the system.
4) Input validation error (CVE-ID: CVE-2020-12359)
The vulnerability allows a local attacker to escalate privileges on the system.
The vulnerability exists due to insufficient control flow management in the firmware. An attacker with physical access can pass specially crafted input to the application and gain elevated privileges on the system.
5) Buffer overflow (CVE-ID: CVE-2020-12358)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to a boundary error when in the firmware. A local administrator can trigger memory corruption and cause a denial of service condition on the target system.
6) Improper Initialization (CVE-ID: CVE-2021-0095)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to improper initialization in the firmware. A local administrator can run a specially crafted application to cause a denial of service contiion on the target system.
7) Out-of-bounds read (CVE-ID: CVE-2020-12360)
The vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to a boundary condition in the firmware. A local user can trigger out-of-bounds read error and read contents of memory on the system.
8) Input validation error (CVE-ID: CVE-2020-24486)
The vulnerability allows a local user to perform a denial of service (DoS) attack.
The vulnerability exists due to insufficient validation of user-supplied input in the firmware. A local user can pass specially crafted input to the application and perform a denial of service (DoS) attack.
Remediation
Install update from vendor's website.