ID

VAR-202008-1135


CVE

CVE-2020-8689


TITLE

Intel(R) Wireless for Open Source Buffer error vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-009494

DESCRIPTION

Improper buffer restrictions in the Intel(R) Wireless for Open Source before version 1.5 may allow an unauthenticated user to potentially enable denial of service via adjacent access. Intel(R) Wireless for Open Source Exists in a buffer error vulnerability.Service operation interruption (DoS) It may be put into a state. An attacker could exploit this vulnerability to cause a denial of service

Trust: 1.71

sources: NVD: CVE-2020-8689 // JVNDB: JVNDB-2020-009494 // VULHUB: VHN-186814

AFFECTED PRODUCTS

vendor:intelmodel:inet wireless daemonscope:ltversion:1.5

Trust: 1.0

vendor:intelmodel:wireless for open sourcescope:eqversion:1.5

Trust: 0.8

sources: JVNDB: JVNDB-2020-009494 // NVD: CVE-2020-8689

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-8689
value: MEDIUM

Trust: 1.0

NVD: JVNDB-2020-009494
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202008-639
value: MEDIUM

Trust: 0.6

VULHUB: VHN-186814
value: LOW

Trust: 0.1

nvd@nist.gov: CVE-2020-8689
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: JVNDB-2020-009494
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-186814
severity: LOW
baseScore: 3.3
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:P
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 6.5
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-8689
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: JVNDB-2020-009494
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-186814 // JVNDB: JVNDB-2020-009494 // CNNVD: CNNVD-202008-639 // NVD: CVE-2020-8689

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-186814 // JVNDB: JVNDB-2020-009494 // NVD: CVE-2020-8689

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-202008-639

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-202008-639

CONFIGURATIONS

sources: JVNDB: JVNDB-2020-009494

PATCH

title:INTEL-SA-00379url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00379.html

Trust: 0.8

title:Intel Wireless for Open Source Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=126484

Trust: 0.6

sources: JVNDB: JVNDB-2020-009494 // CNNVD: CNNVD-202008-639

EXTERNAL IDS

db:NVDid:CVE-2020-8689

Trust: 2.5

db:JVNid:JVNVU99606488

Trust: 0.8

db:JVNDBid:JVNDB-2020-009494

Trust: 0.8

db:CNNVDid:CNNVD-202008-639

Trust: 0.7

db:AUSCERTid:ESB-2020.2767

Trust: 0.6

db:VULHUBid:VHN-186814

Trust: 0.1

sources: VULHUB: VHN-186814 // JVNDB: JVNDB-2020-009494 // CNNVD: CNNVD-202008-639 // NVD: CVE-2020-8689

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00379.html

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-8689

Trust: 1.4

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2020-8689

Trust: 0.8

url:https://jvn.jp/vu/jvnvu99606488

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2020.2767/

Trust: 0.6

sources: VULHUB: VHN-186814 // JVNDB: JVNDB-2020-009494 // CNNVD: CNNVD-202008-639 // NVD: CVE-2020-8689

SOURCES

db:VULHUBid:VHN-186814
db:JVNDBid:JVNDB-2020-009494
db:CNNVDid:CNNVD-202008-639
db:NVDid:CVE-2020-8689

LAST UPDATE DATE

2024-11-23T21:35:21.740000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-186814date:2021-07-21T00:00:00
db:JVNDBid:JVNDB-2020-009494date:2020-11-10T06:27:08
db:CNNVDid:CNNVD-202008-639date:2021-01-05T00:00:00
db:NVDid:CVE-2020-8689date:2024-11-21T05:39:15.420

SOURCES RELEASE DATE

db:VULHUBid:VHN-186814date:2020-08-13T00:00:00
db:JVNDBid:JVNDB-2020-009494date:2020-11-10T06:27:08
db:CNNVDid:CNNVD-202008-639date:2020-08-12T00:00:00
db:NVDid:CVE-2020-8689date:2020-08-13T04:15:13.990