ID

VAR-202004-0363


CVE

CVE-2020-0576


TITLE

Intel(R) Modular Server MFS2600KISPP Compute Classic buffer overflow vulnerability in module

Trust: 0.8

sources: JVNDB: JVNDB-2020-004596

DESCRIPTION

Buffer overflow in Intel(R) Modular Server MFS2600KISPP Compute Module may allow an unauthenticated user to potentially enable denial of service via adjacent access. Intel Modular Server MFS2600KISPP Compute Module is a computing module of American Intel Corporation. A remote attacker can exploit the vulnerability with a specially crafted request to cause a denial of service

Trust: 2.16

sources: NVD: CVE-2020-0576 // JVNDB: JVNDB-2020-004596 // CNVD: CNVD-2020-28229

IOT TAXONOMY

category:['IoT']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2020-28229

AFFECTED PRODUCTS

vendor:intelmodel:compute module mfs2600kiscope:eqversion:*

Trust: 1.0

vendor:intelmodel:compute module mfs2600kiscope: - version: -

Trust: 0.8

vendor:intelmodel:modular server mfs2600kispp compute modulescope: - version: -

Trust: 0.6

sources: CNVD: CNVD-2020-28229 // JVNDB: JVNDB-2020-004596 // NVD: CVE-2020-0576

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-0576
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-004596
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2020-28229
value: LOW

Trust: 0.6

CNNVD: CNNVD-202004-1201
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2020-0576
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-004596
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2020-28229
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

nvd@nist.gov: CVE-2020-0576
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-004596
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2020-28229 // JVNDB: JVNDB-2020-004596 // CNNVD: CNNVD-202004-1201 // NVD: CVE-2020-0576

PROBLEMTYPE DATA

problemtype:CWE-120

Trust: 1.8

sources: JVNDB: JVNDB-2020-004596 // NVD: CVE-2020-0576

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202004-1201

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-004596

PATCH

title:INTEL-SA-00351url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00351.html

Trust: 0.8

sources: JVNDB: JVNDB-2020-004596

EXTERNAL IDS

db:NVDid:CVE-2020-0576

Trust: 3.0

db:JVNDBid:JVNDB-2020-004596

Trust: 0.8

db:CNVDid:CNVD-2020-28229

Trust: 0.6

db:CNNVDid:CNNVD-202004-1201

Trust: 0.6

sources: CNVD: CNVD-2020-28229 // JVNDB: JVNDB-2020-004596 // CNNVD: CNNVD-202004-1201 // NVD: CVE-2020-0576

REFERENCES

url:https://nvd.nist.gov/vuln/detail/cve-2020-0576

Trust: 2.0

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00351.html

Trust: 1.6

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-0576

Trust: 0.8

sources: CNVD: CNVD-2020-28229 // JVNDB: JVNDB-2020-004596 // CNNVD: CNNVD-202004-1201 // NVD: CVE-2020-0576

SOURCES

db:CNVDid:CNVD-2020-28229
db:JVNDBid:JVNDB-2020-004596
db:CNNVDid:CNNVD-202004-1201
db:NVDid:CVE-2020-0576

LAST UPDATE DATE

2024-11-23T23:04:26.390000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2020-28229date:2020-05-14T00:00:00
db:JVNDBid:JVNDB-2020-004596date:2020-05-21T00:00:00
db:CNNVDid:CNNVD-202004-1201date:2020-04-22T00:00:00
db:NVDid:CVE-2020-0576date:2024-11-21T04:53:47.587

SOURCES RELEASE DATE

db:CNVDid:CNVD-2020-28229date:2020-05-14T00:00:00
db:JVNDBid:JVNDB-2020-004596date:2020-05-21T00:00:00
db:CNNVDid:CNNVD-202004-1201date:2020-04-15T00:00:00
db:NVDid:CVE-2020-0576date:2020-04-15T17:15:14.107