4.4
CVE-2020-24498
- EPSS 0.06%
- Veröffentlicht 17.02.2021 14:15:18
- Zuletzt bearbeitet 21.11.2024 05:14:55
- Quelle secure@intel.com
- Teams Watchlist Login
- Unerledigt Login
Buffer overflow in the firmware for Intel(R) E810 Ethernet Controllers before version 1.4.1.13 may allow a privileged user to potentially enable denial of service via local access.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Intel ≫ Ethernet Network Adapter E810 Firmware Version < 1.4.1.13
Intel ≫ Ethernet Network Adapter E810-cqda1 Version-
Intel ≫ Ethernet Network Adapter E810-cqda1 For Ocp Version-
Intel ≫ Ethernet Network Adapter E810-cqda1 For Ocp 3.0 Version-
Intel ≫ Ethernet Network Adapter E810-cqda2 Version-
Intel ≫ Ethernet Network Adapter E810-cqda2 For Ocp 3.0 Version-
Intel ≫ Ethernet Network Adapter E810-xxvda2 Version-
Intel ≫ Ethernet Network Adapter E810-xxvda2 For Ocp Version-
Intel ≫ Ethernet Network Adapter E810-xxvda2 For Ocp 3.0 Version-
Intel ≫ Ethernet Network Adapter E810-xxvda4 Version-
Intel ≫ Ethernet Network Adapter E810-cqda1 For Ocp Version-
Intel ≫ Ethernet Network Adapter E810-cqda1 For Ocp 3.0 Version-
Intel ≫ Ethernet Network Adapter E810-cqda2 Version-
Intel ≫ Ethernet Network Adapter E810-cqda2 For Ocp 3.0 Version-
Intel ≫ Ethernet Network Adapter E810-xxvda2 Version-
Intel ≫ Ethernet Network Adapter E810-xxvda2 For Ocp Version-
Intel ≫ Ethernet Network Adapter E810-xxvda2 For Ocp 3.0 Version-
Intel ≫ Ethernet Network Adapter E810-xxvda4 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.06% | 0.169 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 4.4 | 0.8 | 3.6 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 2.1 | 3.9 | 2.9 |
AV:L/AC:L/Au:N/C:N/I:N/A:P
|
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.