// For flags

CVE-2020-12299

 

Severity Score

8.2
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Improper input validation in BIOS firmware for Intel(R) Server Board Families S2600ST, S2600BP and S2600WF may allow a privileged user to potentially enable escalation of privilege via local access.

Una comprobación de entrada inapropiada en el firmware del BIOS para Intel® Server Board Families versiones S2600ST, S2600BP y S2600WF, puede permitir a un usuario privilegiado habilitar potencialmente una escalada de privilegios por medio de un acceso local

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-04-28 CVE Reserved
  • 2020-08-13 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-08-04 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Intel
Search vendor "Intel"
S2600stqr Firmware
Search vendor "Intel" for product "S2600stqr Firmware"
< 02.01.0012
Search vendor "Intel" for product "S2600stqr Firmware" and version " < 02.01.0012"
-
Affected
in Intel
Search vendor "Intel"
S2600stqr
Search vendor "Intel" for product "S2600stqr"
--
Safe
Intel
Search vendor "Intel"
S2600stbr Firmware
Search vendor "Intel" for product "S2600stbr Firmware"
< 02.01.0012
Search vendor "Intel" for product "S2600stbr Firmware" and version " < 02.01.0012"
-
Affected
in Intel
Search vendor "Intel"
S2600stbr
Search vendor "Intel" for product "S2600stbr"
--
Safe
Intel
Search vendor "Intel"
S2600bpsr Firmware
Search vendor "Intel" for product "S2600bpsr Firmware"
< 02.01.0012
Search vendor "Intel" for product "S2600bpsr Firmware" and version " < 02.01.0012"
-
Affected
in Intel
Search vendor "Intel"
S2600bpsr
Search vendor "Intel" for product "S2600bpsr"
--
Safe
Intel
Search vendor "Intel"
S2600bpbr Firmware
Search vendor "Intel" for product "S2600bpbr Firmware"
< 02.01.0012
Search vendor "Intel" for product "S2600bpbr Firmware" and version " < 02.01.0012"
-
Affected
in Intel
Search vendor "Intel"
S2600bpbr
Search vendor "Intel" for product "S2600bpbr"
--
Safe
Intel
Search vendor "Intel"
S2600bpqr Firmware
Search vendor "Intel" for product "S2600bpqr Firmware"
< 02.01.0012
Search vendor "Intel" for product "S2600bpqr Firmware" and version " < 02.01.0012"
-
Affected
in Intel
Search vendor "Intel"
S2600bpqr
Search vendor "Intel" for product "S2600bpqr"
--
Safe
Intel
Search vendor "Intel"
S2600wftr Firmware
Search vendor "Intel" for product "S2600wftr Firmware"
< 02.01.0012
Search vendor "Intel" for product "S2600wftr Firmware" and version " < 02.01.0012"
-
Affected
in Intel
Search vendor "Intel"
S2600wftr
Search vendor "Intel" for product "S2600wftr"
--
Safe
Intel
Search vendor "Intel"
S2600wf0r Firmware
Search vendor "Intel" for product "S2600wf0r Firmware"
< 02.01.0012
Search vendor "Intel" for product "S2600wf0r Firmware" and version " < 02.01.0012"
-
Affected
in Intel
Search vendor "Intel"
S2600wf0r
Search vendor "Intel" for product "S2600wf0r"
--
Safe
Intel
Search vendor "Intel"
S2600wfqr Firmware
Search vendor "Intel" for product "S2600wfqr Firmware"
< 02.01.0012
Search vendor "Intel" for product "S2600wfqr Firmware" and version " < 02.01.0012"
-
Affected
in Intel
Search vendor "Intel"
S2600wfqr
Search vendor "Intel" for product "S2600wfqr"
--
Safe