Security News > 2020 > March > Intel Patches 27 Vulnerabilities Across Product Portfolio
Intel this week released patches for more than two dozen vulnerabilities impacting graphics drivers, FPGA, processors, NUC, BlueZ, and other products.
The chip maker patched a total of 17 vulnerabilities in its graphics drivers, the most important of which is a buffer overflow that could result in denial of service.
Ten of the remaining vulnerabilities are considered medium severity and could result in escalation of privilege, denial of service, or information disclosure.
Tracked as CVE-2020-0530 and CVE-2020-0526, the vulnerabilities are considered high severity, featuring CVSS scores of 7.8 and 7.7, respectively.
All of these vulnerabilities could be exploited by authenticated users via local access, Intel says.
News URL
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2020-03-12 | CVE-2020-0526 | Improper Input Validation vulnerability in Intel products Improper input validation in firmware for Intel(R) NUC may allow a privileged user to potentially enable escalation of privilege via local access. | 6.7 |
2020-03-12 | CVE-2020-0530 | Classic Buffer Overflow vulnerability in Intel products Improper buffer restrictions in firmware for Intel(R) NUC may allow an authenticated user to potentially enable escalation of privilege via local access. | 7.8 |