Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.
References
Link | Resource |
---|---|
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html | Patch Vendor Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html | Vendor Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html | Patch Vendor Advisory |
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
|
History
21 Nov 2024, 04:53
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00355.html - Patch, Vendor Advisory | |
References | () https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html - Vendor Advisory |
28 Apr 2022, 18:58
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-732 | |
CPE | cpe:2.3:h:intel:pentium_j6426:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n4020:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_n3700:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j4105:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j3355:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j1900:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n5105:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n4120:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_n3510:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n2810:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n2840:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_n3540:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n3050:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n2815:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j3455:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j3060:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_j2900:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j4125:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j3455e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j1750:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_n3710:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n2920:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_j3710:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_x7-e3950:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n3450:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_j2850:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n4000:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_x5-e3930:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n3350:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n3000:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n2807:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n6211:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n2830:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_n4200:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n2940:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j1800:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n4500:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_n6415:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n2820:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n3060:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n3150:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j4005:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j3160:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n3160:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n6210:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j4025:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n3010:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n2806:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n2930:-:*:*:*:*:*:*:* cpe:2.3:h:intel:atom_x5-e3940:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n3350e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n2805:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j3355e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j1850:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n4100:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_n4200e:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_j4205:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j6412:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_n3530:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_j6413:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n5100:-:*:*:*:*:*:*:* cpe:2.3:h:intel:pentium_n3520:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n2808:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n2910:-:*:*:*:*:*:*:* cpe:2.3:h:intel:celeron_n4505:-:*:*:*:*:*:*:* |
|
References | (CONFIRM) https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00360.html - Vendor Advisory |
Information
Published : 2020-08-13 04:15
Updated : 2024-11-21 04:53
NVD link : CVE-2020-0559
Mitre link : CVE-2020-0559
CVE.ORG link : CVE-2020-0559
JSON object : View
Products Affected
intel
- celeron_n6210
- ac_8265_firmware
- pentium_j3710
- celeron_n3000
- celeron_n2830
- ac_3168_firmware
- celeron_j1900
- celeron_n4000
- celeron_n5100
- ac_9461_firmware
- celeron_n4020
- celeron_j6412
- celeron_j4105
- ax200_firmware
- atom_x5-e3930
- celeron_n2920
- ac_9260_firmware
- celeron_j3455
- pentium_n3710
- ac_9560_firmware
- celeron_j4125
- celeron_n2815
- celeron_n4120
- celeron_n3450
- celeron_n2940
- celeron_j1750
- celeron_n5105
- celeron_n2910
- ac_9462_firmware
- pentium_j6426
- celeron_j1850
- pentium_j2900
- celeron_n3350
- atom_x5-e3940
- pentium_n3540
- celeron_n4500
- celeron_n2806
- ax201_firmware
- pentium_j2850
- celeron_n3050
- ac_8260_firmware
- celeron_n2820
- pentium_n6415
- celeron_n3150
- celeron_j4025
- celeron_n2807
- celeron_j3455e
- ac_7265_firmware
- atom_x7-e3950
- celeron_j3355e
- celeron_n2810
- pentium_n4200
- pentium_n4200e
- celeron_n3060
- celeron_j1800
- celeron_j3060
- celeron_n3160
- celeron_n4100
- celeron_j3355
- pentium_n3520
- celeron_j3160
- celeron_j6413
- celeron_j4005
- pentium_n3530
- pentium_n3700
- ac_3165_firmware
- celeron_n2805
- celeron_n4505
- celeron_n2840
- pentium_j4205
- pentium_n3510
- celeron_n2930
- celeron_n6211
- celeron_n2808
- celeron_n3010
- celeron_n3350e
microsoft
- windows_8.1
- windows_7
CWE
CWE-732
Incorrect Permission Assignment for Critical Resource