7.8
CWE
732
Advisory Published
Updated

CVE-2020-0559

First published: Thu Aug 13 2020(Updated: )

Insecure inherited permissions in some Intel(R) PROSet/Wireless WiFi products on Windows* 7 and 8.1 before version 21.40.5.1 may allow an authenticated user to potentially enable escalation of privilege via local access.

Credit: secure@intel.com

Affected SoftwareAffected VersionHow to fix
Intel PROSet/Wireless Software for Intel Dual Band Wireless-AC 3165<21.40.5.1
Intel AC3168 Firmware<21.40.5.1
Intel AC 7265<21.40.5.1
Intel ProSet Wireless Software and Drivers for Ac 8260<21.40.5.1
Intel ProSet AC 8265 Firmware<21.40.5.1
Intel ProSet AC 9260 Firmware<21.40.5.1
Intel PROSet AC 9461 Firmware<21.40.5.1
Intel PROSet AC 9462 Firmware<21.40.5.1
Intel AC 9560 Firmware<21.40.5.1
Intel AX200 Firmware<21.40.5.1
Intel Wi-Fi 6E AX201 Firmware<21.40.5.1
Microsoft Windows 7
Microsoft Windows
Intel Atom x5-E3930 firmware
Intel Atom x5-E3940 firmware
Intel Atom X7-a3950 Firmware
Intel Celeron J1750 Firmware
Intel Celeron J1800 Firmware
Intel Celeron J1850
Intel Celeron J1900
Intel Celeron J3060 Firmware
Intel Celeron J3160 Firmware
Intel Celeron J3355E
Intel Celeron J3355E Firmware
Intel Celeron J3455 Firmware
Intel Celeron J3455
Intel Celeron J4005 Firmware
Intel Celeron J4025 Firmware
Intel Celeron J4105 Firmware
Intel Celeron J4125 Firmware
Intel Celeron J6412
Intel Celeron J6413 Firmware
Intel Celeron N2805 Firmware
Intel Celeron N2806 Firmware
Intel Celeron N2807 Firmware
Intel Celeron N2808 Firmware
Intel Celeron N2810 Firmware
Intel Celeron N2815 Firmware
Intel Celeron N2820 Firmware
Intel Celeron N2830 Firmware
Intel Celeron N2840 Firmware
Intel Celeron N2910 Firmware
Intel Celeron n2920 firmware
Intel Celeron n2930 firmware
Intel Celeron N2940 Firmware
Intel Celeron N3000
Intel Celeron N3010 Firmware
Intel Celeron N3050 Firmware
Intel Celeron N3060 Firmware
Intel Celeron N3150 Firmware
Intel Celeron N3160 Firmware
Intel Celeron N3350
Intel Celeron N3350E Firmware
Intel Celeron N3450 Firmware
Intel Celeron N4000C
Intel Celeron N4020 Firmware
Intel Celeron N4100 Firmware
Intel Celeron n4120 firmware
Intel Celeron N4500 Firmware
Intel Celeron N4505 Firmware
Intel Celeron N5100
Intel Celeron N5105 Firmware
Intel Celeron N6210 Firmware
Intel Celeron N6211
Intel Pentium J2850 Firmware
Intel Pentium J2900 Firmware
Intel Pentium J3710 Firmware
Intel Pentium J4205
Intel Pentium J6426 Firmware
Intel Pentium N3510 Firmware
Intel Pentium N3520 Firmware
Intel Pentium N3530 Firmware
Intel Pentium Processors
Intel Pentium N3700 Firmware
Intel Pentium N3710 Firmware
Intel Pentium N4200 Firmware
Intel Pentium N4200E Firmware
Intel Pentium N6415 Firmware

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2020-0559?

    CVE-2020-0559 has a medium severity rating, indicating a moderate risk of exploitation.

  • How do I fix CVE-2020-0559?

    To mitigate CVE-2020-0559, update the affected Intel WiFi firmware to version 21.40.5.1 or later.

  • Which Intel products are affected by CVE-2020-0559?

    CVE-2020-0559 affects various Intel PROSet/Wireless WiFi products operating on Windows 7 and 8.1 prior to firmware version 21.40.5.1.

  • Can CVE-2020-0559 be exploited remotely?

    No, exploitation of CVE-2020-0559 requires local access by an authenticated user.

  • What could be the impact of CVE-2020-0559 on a system?

    The impact of CVE-2020-0559 could allow an authenticated user to escalate privileges on the affected system.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203