Vulnerability Description
Improper input validation in the firmware for Intel(R) Server Board S2600ST and S2600WF families may allow a privileged user to potentially enable escalation of privilege via local access.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Intel | Server Board S2600St Firmware | < 02.01.0011 |
| Intel | Server Board S2600Stbr | - |
| Intel | Server Board S2600Stqr | - |
| Intel | Server Board S2600Wf Firmware | < 02.01.0012 |
| Intel | Server Board S2600Wf0R | - |
| Intel | Server Board S2600Wfqr | - |
| Intel | Server Board S2600Wftr | - |
Related Weaknesses (CWE)
References
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00439PatchVendor Advisory
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00439PatchVendor Advisory
FAQ
What is CVE-2020-0572?
CVE-2020-0572 is a vulnerability with a CVSS score of 6.7 (MEDIUM). Improper input validation in the firmware for Intel(R) Server Board S2600ST and S2600WF families may allow a privileged user to potentially enable escalation of privilege via local access.
How severe is CVE-2020-0572?
CVE-2020-0572 has been rated MEDIUM with a CVSS base score of 6.7/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-0572?
Check the references section above for vendor advisories and patch information. Affected products include: Intel Server Board S2600St Firmware, Intel Server Board S2600Stbr, Intel Server Board S2600Stqr, Intel Server Board S2600Wf Firmware, Intel Server Board S2600Wf0R.