Show plain JSON{"id": "CVE-2020-0596", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 5.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2020-06-15T14:15:11.597", "references": [{"url": "https://security.netapp.com/advisory/ntap-20200611-0007/", "source": "secure@intel.com"}, {"url": "https://support.lenovo.com/de/en/product_security/len-30041", "source": "secure@intel.com"}, {"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "tags": ["Vendor Advisory"], "source": "secure@intel.com"}, {"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "tags": ["Vendor Advisory"], "source": "secure@intel.com"}, {"url": "https://www.synology.com/security/advisory/Synology_SA_20_15", "tags": ["Third Party Advisory"], "source": "secure@intel.com"}, {"url": "https://security.netapp.com/advisory/ntap-20200611-0007/", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://support.lenovo.com/de/en/product_security/len-30041", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00295.html", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://www.synology.com/security/advisory/Synology_SA_20_15", "tags": ["Third Party Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-20"}]}], "descriptions": [{"lang": "en", "value": "Improper input validation in DHCPv6 subsystem in Intel(R) AMT and Intel(R) ISM versions before 11.8.77, 11.12.77, 11.22.77 and 12.0.64 may allow an unauthenticated user to potentially enable information disclosure via network access."}, {"lang": "es", "value": "Una comprobaci\u00f3n de entrada inapropiada en el subsistema DHCPv6 en Intel\u00ae AMT e Intel\u00ae ISM versiones anteriores a 11.8.77, 11.12.77, 11.22.77 y 12.0.64, puede permitir a un usuario no autenticado habilitar potencialmente una divulgaci\u00f3n de informaci\u00f3n por medio de un acceso de red"}], "lastModified": "2024-11-21T04:53:49.500", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2CD1D393-58BA-4F53-835F-C7B13F44BBC6", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0"}, {"criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1171B682-C648-451B-97D2-4AADA9638BB9", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10"}, {"criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBF0384F-DBAC-49FD-9E31-453AF6A13A68", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20"}, {"criteria": "cpe:2.3:o:intel:active_management_technology_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "064D0505-C8E2-4F3E-9186-6923C7D01A55", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F18CD125-5319-4955-ADEA-24073521E975", "versionEndExcluding": "11.8.77", "versionStartIncluding": "11.0"}, {"criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B907926D-451E-4435-AEC2-2E5DBA695AE7", "versionEndExcluding": "11.12.77", "versionStartIncluding": "11.10"}, {"criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "564A5BEF-C36A-4D8E-B458-D3083294AFCD", "versionEndExcluding": "11.22.77", "versionStartIncluding": "11.20"}, {"criteria": "cpe:2.3:a:intel:service_manager:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A433A19A-BBC9-4A5A-8D55-31371F91ABDA", "versionEndExcluding": "12.0.64", "versionStartIncluding": "12.0"}], "operator": "OR"}]}], "sourceIdentifier": "secure@intel.com"}