CVE-2019-14612
| Summary |
Out of bounds write in firmware for Intel(R) NUC(R) may allow a privileged user to potentially enable escalation of privilege via local access.
|
| Publication Date |
Dec. 17, 2019, 5:15 a.m. |
| Registration Date |
Jan. 26, 2021, 11:39 a.m. |
| Last Update |
Nov. 21, 2024, 1:27 p.m. |
|
CVSS3.1 : MEDIUM
|
| スコア |
6.7
|
| Vector |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H |
| 攻撃元区分(AV) |
ローカル |
| 攻撃条件の複雑さ(AC) |
低 |
| 攻撃に必要な特権レベル(PR) |
高 |
| 利用者の関与(UI) |
不要 |
| 影響の想定範囲(S) |
変更なし |
| 機密性への影響(C) |
高 |
| 完全性への影響(I) |
高 |
| 可用性への影響(A) |
高 |
|
CVSS2.0 : MEDIUM
|
| Score |
4.6
|
| Vector |
AV:L/AC:L/Au:N/C:P/I:P/A:P |
| 攻撃元区分(AV) |
ローカル |
| 攻撃条件の複雑さ(AC) |
低 |
| 攻撃前の認証要否(Au) |
不要 |
| 機密性への影響(C) |
低 |
| 完全性への影響(I) |
低 |
| 可用性への影響(A) |
低 |
| Get all privileges. |
いいえ
|
| Get user privileges |
いいえ
|
| Get other privileges |
いいえ
|
| User operation required |
いいえ
|
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:nuc_8_mainstream_game_kit_firmware:*:*:*:*:*:*:*:* |
|
|
|
0036 |
| execution environment |
| 1 |
cpe:2.3:h:intel:nuc_8_mainstream_game_kit:-:*:*:*:*:*:*:* |
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:nuc_8_mainstream_game_mini_computer_firmware:*:*:*:*:*:*:*:* |
|
|
|
0036 |
| execution environment |
| 1 |
cpe:2.3:h:intel:nuc_8_mainstream_game_mini_computer:-:*:*:*:*:*:*:* |
| Configuration3 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:nuc8i7bek_firmware:*:*:*:*:*:*:*:* |
|
|
|
0077 |
| execution environment |
| 1 |
cpe:2.3:h:intel:nuc8i7bek:-:*:*:*:*:*:*:* |
| Configuration4 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:cd1p64gk_firmware:*:*:*:*:*:*:*:* |
|
|
|
0053 |
| execution environment |
| 1 |
cpe:2.3:h:intel:cd1p64gk:-:*:*:*:*:*:*:* |
| Configuration5 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:nuc8i3cysm_firmware:*:*:*:*:*:*:*:* |
|
|
|
0043 |
| execution environment |
| 1 |
cpe:2.3:h:intel:nuc8i3cysm:-:*:*:*:*:*:*:* |
| Configuration6 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:nuc8i7hnk_firmware:*:*:*:*:*:*:*:* |
|
|
|
0059 |
| execution environment |
| 1 |
cpe:2.3:h:intel:nuc8i7hnk:-:*:*:*:*:*:*:* |
| Configuration7 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:nuc7i7dnke_firmware:*:*:*:*:*:*:*:* |
|
|
|
0067 |
| execution environment |
| 1 |
cpe:2.3:h:intel:nuc7i7dnke:-:*:*:*:*:*:*:* |
| Configuration8 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:nuc7i5dnke_firmware:*:*:*:*:*:*:*:* |
|
|
|
0067 |
| execution environment |
| 1 |
cpe:2.3:h:intel:nuc7i5dnke:-:*:*:*:*:*:*:* |
| Configuration9 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:nuc7i3dnhe_firmware:*:*:*:*:*:*:*:* |
|
|
|
0067 |
| execution environment |
| 1 |
cpe:2.3:h:intel:nuc7i3dnhe:-:*:*:*:*:*:*:* |
| Configuration10 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:stk2mv64cc_firmware:*:*:*:*:*:*:*:* |
|
|
|
0061 |
| execution environment |
| 1 |
cpe:2.3:h:intel:stk2mv64cc:-:*:*:*:*:*:*:* |
| Configuration11 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:stk2m3w64cc_firmware:*:*:*:*:*:*:*:* |
|
|
|
0062 |
| execution environment |
| 1 |
cpe:2.3:h:intel:stk2m3w64cc:-:*:*:*:*:*:*:* |
| Configuration12 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:nuc6i7kyk_firmware:*:*:*:*:*:*:*:* |
|
|
|
0066 |
| execution environment |
| 1 |
cpe:2.3:h:intel:nuc6i7kyk:-:*:*:*:*:*:*:* |
| Configuration13 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:nuc6i5syh_firmware:*:*:*:*:*:*:*:* |
|
|
|
0072 |
| execution environment |
| 1 |
cpe:2.3:h:intel:nuc6i5syh:-:*:*:*:*:*:*:* |
| Configuration14 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:nuc7cjyh_firmware:*:*:*:*:*:*:*:* |
|
|
|
0053 |
| execution environment |
| 1 |
cpe:2.3:h:intel:nuc7cjyh:-:*:*:*:*:*:*:* |
| Configuration15 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:cd1m3128mk_firmware:*:*:*:*:*:*:*:* |
|
|
|
0058 |
| execution environment |
| 1 |
cpe:2.3:h:intel:cd1m3128mk:-:*:*:*:*:*:*:* |
| Configuration16 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:cd1iv128mk_firmware:*:*:*:*:*:*:*:* |
|
|
|
0038 |
| execution environment |
| 1 |
cpe:2.3:h:intel:cd1iv128mk:-:*:*:*:*:*:*:* |
| Configuration17 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:nuc6cays_firmware:*:*:*:*:*:*:*:* |
|
|
|
0064 |
| execution environment |
| 1 |
cpe:2.3:h:intel:nuc6cays:-:*:*:*:*:*:*:* |
| Configuration18 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:de3815tybe_firmware:*:*:*:*:*:*:*:* |
|
|
|
0024 |
| execution environment |
| 1 |
cpe:2.3:h:intel:de3815tybe:-:*:*:*:*:*:*:* |
| Configuration19 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:intel:d34010wyb_firmware:*:*:*:*:*:*:*:* |
|
|
|
0054 |
| execution environment |
| 1 |
cpe:2.3:h:intel:d34010wyb:-:*:*:*:*:*:*:* |
Related information, measures and tools
Common Vulnerabilities List
JVN Vulnerability Information
Intel(R) NUC(R) における境界外書き込みに関する脆弱性
| Title |
Intel(R) NUC(R) における境界外書き込みに関する脆弱性
|
| Summary |
Intel(R) NUC(R) には、境界外書き込みに関する脆弱性が存在します。
|
| Possible impacts |
情報を取得される、情報を改ざんされる、およびサービス運用妨害 (DoS) 状態にされる可能性があります。 |
| Solution |
ベンダより正式な対策が公開されています。ベンダ情報を参照して適切な対策を実施してください。 |
| Publication Date |
Dec. 10, 2019, midnight |
| Registration Date |
Jan. 16, 2020, 2:50 p.m. |
| Last Update |
Jan. 16, 2020, 2:50 p.m. |
Affected System
| インテル |
|
Intel CD1P64GK ファームウェア
|
|
Intel NUC 8 Mainstream Game Kit ファームウェア
|
|
Intel NUC 8 Mainstream Game Mini Computer ファームウェア
|
|
Intel NUC7i3DNHE ファームウェア
|
|
Intel NUC7i5DNKE ファームウェア
|
|
Intel NUC7i7DNKE ファームウェア
|
|
Intel NUC8i3CYSM ファームウェア
|
|
Intel NUC8i7BEK ファームウェア
|
|
Intel NUC8i7HNK ファームウェア
|
|
Intel STK2mv64CC ファームウェア
|
CVE (情報セキュリティ 共通脆弱性識別子)
CWE (共通脆弱性タイプ一覧)
ベンダー情報
その他
Change Log
| No |
Changed Details |
Date of change |
| 1 |
[2020年01月16日] 掲載 |
Jan. 16, 2020, 2:50 p.m. |