First published: Thu Nov 12 2020(Updated: )
Improper input validation in the firmware for Intel(R) Server Board S2600ST and S2600WF families may allow a privileged user to potentially enable escalation of privilege via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel Server Board S2600ST Firmware | <02.01.0011 | |
Intel S2600STBR Firmware | ||
Intel BBS2600STQR | ||
Intel Server Board S2600WF0R | <02.01.0012 | |
Intel Server Board S2600WF0R | ||
Intel S2600WFQR Firmware | ||
Intel S2600WFTR |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-0572 has a severity rating of Medium because it allows a privileged user to potentially escalate privileges.
To fix CVE-2020-0572, users should update their Intel Server Board firmware to the latest version beyond the vulnerable thresholds for S2600ST and S2600WF.
CVE-2020-0572 affects users of Intel Server Board S2600ST and S2600WF families running specific firmware versions.
CVE-2020-0572 impacts server systems equipped with Intel S2600ST and S2600WF boards with outdated firmware.
CVE-2020-0572 is an input validation vulnerability that could lead to local privilege escalation.