First published: Thu Nov 12 2020(Updated: )
Protection mechanism failure in Intel(R) Ethernet 700 Series Controllers before version 7.3 may allow a privileged user to potentially enable escalation of privilege and/or denial of service via local access.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Intel V710-at2 Firmware | <7.3 | |
Intel V710-at2 | ||
Intel X710-tm4 Firmware | <7.3 | |
Intel X710-tm4 | ||
Intel X710-at2 Firmware | <7.3 | |
Intel X710-at2 | ||
Intel Xxv710-am2 Firmware | <7.3 | |
Intel Xxv710-am2 | ||
Intel Xxv710-am1 Firmware | <7.3 | |
Intel Xxv710-am1 | ||
Intel X710-bm2 Firmware | <7.3 | |
Intel X710-bm2 | ||
Intel Xl710-bm2 Firmware | <7.3 | |
Intel Xl710-bm2 | ||
Intel Xl710-bm1 Firmware | <7.3 | |
Intel Xl710-bm1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-8690.
The title of the vulnerability is 'Protection mechanism failure in Intel(R) Ethernet 700 Series Controllers before version 7.3 may allow privilege escalation and denial of service.'
The severity of CVE-2020-8690 is medium with a CVSS score of 6.7.
Intel Ethernet 700 Series Controllers with firmware versions up to but excluding 7.3 are affected by CVE-2020-8690.
A privileged user with local access may potentially enable escalation of privilege and/or denial of service.