CWE
754
Advisory Published
Updated

CVE-2020-12292

First published: Wed Jun 09 2021(Updated: )

Improper conditions check in some Intel(R) Thunderbolt(TM) controllers may allow an authenticated user to potentially enable denial of service via local access.

Credit: secure@intel.com

Affected SoftwareAffected VersionHow to fix
Intel jhl6240 Thunderbolt 3<21
Intel JHL6240 Thunderbolt 3
Intel JHL6340 Firmware<46
Intel JHL6340
Intel JHL6540 Thunderbolt 3<46
Intel JHL6540 Thunderbolt 3
Intel JHL7040 Thunderbolt 3 Retimer Firmware<22
Intel JHL7040 Thunderbolt 3 Retimer Firmware
Intel JHL7340 Firmware<60
Intel JHL7340
Intel JHL7440 Thunderbolt 3<60
Intel JHL7440
Intel Jhl7540 Firmware<60
Intel Jhl7540 Thunderbolt 3
Intel JHL8010R USB Retimer<41
Intel JHL8010r USB Retimer Firmware
Intel DSL5320 Thunderbolt 2
Intel DSL5320 Thunderbolt 2 Firmware
Intel DSL5520 Thunderbolt 2 Firmware
Intel DSL5520 Thunderbolt 2 Firmware
Intel DSL6340 Thunderbolt 3 firmware
Intel DSL6340 Thunderbolt 3 firmware
Intel DSL6540 Thunderbolt 3
Intel DSL6540 Thunderbolt 3
Intel JHL8040R Thunderbolt 4 Retimer<41
Intel JHL8040R Thunderbolt 4 Retimer Firmware

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is CVE-2020-12292?

    CVE-2020-12292 is a vulnerability that allows an authenticated user to potentially enable denial of service via local access on some Intel Thunderbolt controllers.

  • What is the severity of CVE-2020-12292?

    The severity of CVE-2020-12292 is medium, with a severity value of 5.5.

  • Which software is affected by CVE-2020-12292?

    The Intel Jhl6240, Jhl6340, Jhl6540, Jhl7040, Jhl7340, Jhl7440, Jhl7540, Jhl8010r, Dsl5320, Dsl5520, Dsl6340, and Dsl6540 Thunderbolt controllers are affected by CVE-2020-12292.

  • How can an authenticated user exploit CVE-2020-12292?

    An authenticated user can potentially enable denial of service via local access.

  • Is there a fix available for CVE-2020-12292?

    To fix CVE-2020-12292, it is recommended to follow the guidance provided by Intel in their security advisory.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203