ID

VAR-202008-0001


CVE

CVE-2020-0553


TITLE

plural Intel(R) Wireless Bluetooth(R) Out-of-bounds read vulnerabilities in the product

Trust: 0.8

sources: JVNDB: JVNDB-2020-009527

DESCRIPTION

Out-of-bounds read in kernel mode driver for some Intel(R) Wireless Bluetooth(R) products on Windows* 10, may allow a privileged user to potentially enable information disclosure via local access. plural Intel(R) Wireless Bluetooth(R) The product contains an out-of-bounds read vulnerability.Information may be obtained

Trust: 1.62

sources: NVD: CVE-2020-0553 // JVNDB: JVNDB-2020-009527

IOT TAXONOMY

category:['network device']sub_category:bluetooth device

Trust: 0.1

sources: OTHER: None

AFFECTED PRODUCTS

vendor:intelmodel:ac 9461scope:ltversion:21.70

Trust: 1.0

vendor:intelmodel:ac 8265scope:ltversion:21.70

Trust: 1.0

vendor:intelmodel:ac 8260scope:ltversion:21.70

Trust: 1.0

vendor:intelmodel:ac 9462scope:ltversion:21.70

Trust: 1.0

vendor:intelmodel:ax200scope:ltversion:21.70

Trust: 1.0

vendor:intelmodel:ac 9560scope:ltversion:21.70

Trust: 1.0

vendor:intelmodel:ac 9260scope:ltversion:21.70

Trust: 1.0

vendor:intelmodel:ax201scope:ltversion:21.70

Trust: 1.0

vendor:intelmodel:ac 3165scope:ltversion:21.70

Trust: 1.0

vendor:intelmodel:ac 7265scope:ltversion:21.70

Trust: 1.0

vendor:intelmodel:ac 3168scope:ltversion:21.70

Trust: 1.0

vendor:intelmodel:ac 3165scope: - version: -

Trust: 0.8

vendor:intelmodel:ac 3168scope: - version: -

Trust: 0.8

vendor:intelmodel:ac 7265scope: - version: -

Trust: 0.8

vendor:intelmodel:ac 8260scope: - version: -

Trust: 0.8

vendor:intelmodel:ac 8265scope: - version: -

Trust: 0.8

vendor:intelmodel:ac 9260scope: - version: -

Trust: 0.8

vendor:intelmodel:ac 9461scope: - version: -

Trust: 0.8

vendor:intelmodel:ac 9462scope: - version: -

Trust: 0.8

vendor:intelmodel:ac 9560scope: - version: -

Trust: 0.8

vendor:intelmodel:ax200scope: - version: -

Trust: 0.8

vendor:intelmodel:ax201scope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-009527 // NVD: CVE-2020-0553

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-0553
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-009527
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202008-613
value: MEDIUM

Trust: 0.6

nvd@nist.gov: CVE-2020-0553
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-009527
severity: LOW
baseScore: 2.1
vectorString: AV:L/AC:L/AU:N/C:P/I:N/A:N
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

nvd@nist.gov: CVE-2020-0553
baseSeverity: MEDIUM
baseScore: 4.4
vectorString: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 0.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-009527
baseSeverity: MEDIUM
baseScore: 4.4
vectorString: CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: HIGH
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: JVNDB: JVNDB-2020-009527 // CNNVD: CNNVD-202008-613 // NVD: CVE-2020-0553

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.8

sources: JVNDB: JVNDB-2020-009527 // NVD: CVE-2020-0553

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202008-613

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202008-613

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-009527

PATCH

title:INTEL-SA-00337url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00337.html

Trust: 0.8

title:Multiple Intel Product Buffer Error Vulnerability Fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=126222

Trust: 0.6

sources: JVNDB: JVNDB-2020-009527 // CNNVD: CNNVD-202008-613

EXTERNAL IDS

db:NVDid:CVE-2020-0553

Trust: 2.5

db:JVNid:JVNVU99606488

Trust: 0.8

db:JVNDBid:JVNDB-2020-009527

Trust: 0.8

db:AUSCERTid:ESB-2020.2763

Trust: 0.6

db:CNNVDid:CNNVD-202008-613

Trust: 0.6

db:OTHERid:NONE

Trust: 0.1

sources: OTHER: None // JVNDB: JVNDB-2020-009527 // CNNVD: CNNVD-202008-613 // NVD: CVE-2020-0553

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00337.html

Trust: 1.6

url:https://nvd.nist.gov/vuln/detail/cve-2020-0553

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-0553

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99606488/

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.2763/

Trust: 0.6

url:https://ieeexplore.ieee.org/abstract/document/10769424

Trust: 0.1

sources: OTHER: None // JVNDB: JVNDB-2020-009527 // CNNVD: CNNVD-202008-613 // NVD: CVE-2020-0553

SOURCES

db:OTHERid: -
db:JVNDBid:JVNDB-2020-009527
db:CNNVDid:CNNVD-202008-613
db:NVDid:CVE-2020-0553

LAST UPDATE DATE

2025-01-30T20:44:04.941000+00:00


SOURCES UPDATE DATE

db:JVNDBid:JVNDB-2020-009527date:2020-11-10T08:48:37
db:CNNVDid:CNNVD-202008-613date:2021-01-05T00:00:00
db:NVDid:CVE-2020-0553date:2024-11-21T04:53:44.883

SOURCES RELEASE DATE

db:JVNDBid:JVNDB-2020-009527date:2020-11-10T08:48:37
db:CNNVDid:CNNVD-202008-613date:2020-08-11T00:00:00
db:NVDid:CVE-2020-0553date:2020-08-13T04:15:12.693