ID

VAR-202102-0266


CVE

CVE-2020-24481


TITLE

Intel(R) Quartus Prime Pro  and  Standard  Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2020-015985

DESCRIPTION

Insecure inherited permissions for the Intel(R) Quartus Prime Pro and Standard edition software may allow an authenticated user to potentially enable escalation of privilege via local access. Intel(R) Quartus Prime Pro and Standard Contains an unspecified vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state

Trust: 1.71

sources: NVD: CVE-2020-24481 // JVNDB: JVNDB-2020-015985 // VULHUB: VHN-178364

AFFECTED PRODUCTS

vendor:intelmodel:quartusscope:ltversion:20.4

Trust: 1.0

vendor:intelmodel:quartusscope:ltversion:20.1

Trust: 1.0

vendor:インテルmodel:quartus primescope: - version: -

Trust: 0.8

vendor:インテルmodel:quartus primescope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2020-015985 // NVD: CVE-2020-24481

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-24481
value: HIGH

Trust: 1.0

NVD: CVE-2020-24481
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202102-982
value: HIGH

Trust: 0.6

VULHUB: VHN-178364
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-24481
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-178364
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-24481
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2020-24481
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-178364 // JVNDB: JVNDB-2020-015985 // CNNVD: CNNVD-202102-982 // NVD: CVE-2020-24481

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

problemtype:Other (CWE-Other) [NVD Evaluation ]

Trust: 0.8

sources: JVNDB: JVNDB-2020-015985 // NVD: CVE-2020-24481

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202102-982

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202102-982

PATCH

title:INTEL-SA-00451url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00451.html

Trust: 0.8

sources: JVNDB: JVNDB-2020-015985

EXTERNAL IDS

db:NVDid:CVE-2020-24481

Trust: 2.5

db:JVNid:JVNVU93808918

Trust: 0.8

db:JVNDBid:JVNDB-2020-015985

Trust: 0.8

db:AUSCERTid:ESB-2021.0478

Trust: 0.6

db:CNNVDid:CNNVD-202102-982

Trust: 0.6

db:VULHUBid:VHN-178364

Trust: 0.1

sources: VULHUB: VHN-178364 // JVNDB: JVNDB-2020-015985 // CNNVD: CNNVD-202102-982 // NVD: CVE-2020-24481

REFERENCES

url:https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00451.html

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2020-24481

Trust: 1.4

url:https://jvn.jp/vu/jvnvu93808918/index.html

Trust: 0.8

url:https://www.auscert.org.au/bulletins/esb-2021.0478

Trust: 0.6

sources: VULHUB: VHN-178364 // JVNDB: JVNDB-2020-015985 // CNNVD: CNNVD-202102-982 // NVD: CVE-2020-24481

SOURCES

db:VULHUBid:VHN-178364
db:JVNDBid:JVNDB-2020-015985
db:CNNVDid:CNNVD-202102-982
db:NVDid:CVE-2020-24481

LAST UPDATE DATE

2024-11-23T20:09:56.258000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-178364date:2021-02-23T00:00:00
db:JVNDBid:JVNDB-2020-015985date:2021-10-29T08:35:00
db:CNNVDid:CNNVD-202102-982date:2022-03-08T00:00:00
db:NVDid:CVE-2020-24481date:2024-11-21T05:14:53.013

SOURCES RELEASE DATE

db:VULHUBid:VHN-178364date:2021-02-17T00:00:00
db:JVNDBid:JVNDB-2020-015985date:2021-10-29T00:00:00
db:CNNVDid:CNNVD-202102-982date:2021-02-10T00:00:00
db:NVDid:CVE-2020-24481date:2021-02-17T14:15:17.217